Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 20:47
Behavioral task
behavioral1
Sample
406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe
Resource
win7-20240903-en
General
-
Target
406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe
-
Size
2.2MB
-
MD5
9446d6e2809a7fc3fe0da1f7e6ea2d6a
-
SHA1
2d0f8823391fbf553ad12301e704140ca1b543d3
-
SHA256
406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e
-
SHA512
c9bd03b0bef4c895a027d7d87950018f4457d1f1df3e4b694f67a0e17eaae7f6a3324d5e1bce0216b5d021cbb2758a0655db0a97c21dd97a47ce61233d45406a
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZd:0UzeyQMS4DqodCnoe+iitjWwwx
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe -
Executes dropped EXE 64 IoCs
pid Process 3572 explorer.exe 4548 explorer.exe 4320 spoolsv.exe 4048 spoolsv.exe 1700 spoolsv.exe 3544 spoolsv.exe 2780 spoolsv.exe 3084 spoolsv.exe 232 spoolsv.exe 3820 spoolsv.exe 3768 spoolsv.exe 4404 spoolsv.exe 1940 spoolsv.exe 3228 spoolsv.exe 3636 spoolsv.exe 3180 spoolsv.exe 2352 spoolsv.exe 628 spoolsv.exe 3572 spoolsv.exe 2260 spoolsv.exe 960 spoolsv.exe 2960 spoolsv.exe 2076 spoolsv.exe 3716 spoolsv.exe 1876 spoolsv.exe 3328 spoolsv.exe 4412 spoolsv.exe 1252 spoolsv.exe 4028 spoolsv.exe 316 spoolsv.exe 2976 spoolsv.exe 4920 spoolsv.exe 2052 spoolsv.exe 4540 spoolsv.exe 1348 spoolsv.exe 2156 spoolsv.exe 3688 spoolsv.exe 3564 explorer.exe 5060 spoolsv.exe 2588 spoolsv.exe 4396 spoolsv.exe 4472 spoolsv.exe 2268 spoolsv.exe 1472 spoolsv.exe 3388 spoolsv.exe 1828 explorer.exe 3124 spoolsv.exe 1860 spoolsv.exe 4628 spoolsv.exe 4376 spoolsv.exe 3028 spoolsv.exe 4716 spoolsv.exe 2484 explorer.exe 4836 spoolsv.exe 1640 spoolsv.exe 1900 spoolsv.exe 4380 spoolsv.exe 1180 spoolsv.exe 3272 spoolsv.exe 640 explorer.exe 2980 spoolsv.exe 5012 spoolsv.exe 4860 spoolsv.exe 2316 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 58 IoCs
description pid Process procid_target PID 4028 set thread context of 4316 4028 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 93 PID 3572 set thread context of 4548 3572 explorer.exe 97 PID 4320 set thread context of 3688 4320 spoolsv.exe 132 PID 4048 set thread context of 5060 4048 spoolsv.exe 134 PID 1700 set thread context of 2588 1700 spoolsv.exe 135 PID 3544 set thread context of 4396 3544 spoolsv.exe 136 PID 2780 set thread context of 4472 2780 spoolsv.exe 137 PID 3084 set thread context of 1472 3084 spoolsv.exe 139 PID 232 set thread context of 3388 232 spoolsv.exe 140 PID 3820 set thread context of 3124 3820 spoolsv.exe 142 PID 3768 set thread context of 1860 3768 spoolsv.exe 143 PID 4404 set thread context of 4628 4404 spoolsv.exe 144 PID 1940 set thread context of 3028 1940 spoolsv.exe 146 PID 3228 set thread context of 4716 3228 spoolsv.exe 147 PID 3636 set thread context of 4836 3636 spoolsv.exe 149 PID 3180 set thread context of 1640 3180 spoolsv.exe 150 PID 2352 set thread context of 1900 2352 spoolsv.exe 151 PID 628 set thread context of 1180 628 spoolsv.exe 153 PID 3572 set thread context of 3272 3572 spoolsv.exe 154 PID 2260 set thread context of 2980 2260 spoolsv.exe 156 PID 960 set thread context of 4860 960 spoolsv.exe 158 PID 2076 set thread context of 1856 2076 spoolsv.exe 160 PID 3716 set thread context of 3608 3716 spoolsv.exe 162 PID 1876 set thread context of 4868 1876 spoolsv.exe 163 PID 3328 set thread context of 3464 3328 spoolsv.exe 164 PID 4412 set thread context of 4368 4412 spoolsv.exe 165 PID 1252 set thread context of 1884 1252 spoolsv.exe 167 PID 4028 set thread context of 4764 4028 spoolsv.exe 168 PID 316 set thread context of 3604 316 spoolsv.exe 170 PID 2976 set thread context of 1976 2976 spoolsv.exe 171 PID 4920 set thread context of 5044 4920 spoolsv.exe 172 PID 2052 set thread context of 2560 2052 spoolsv.exe 174 PID 4540 set thread context of 3304 4540 spoolsv.exe 176 PID 1348 set thread context of 2448 1348 spoolsv.exe 177 PID 2156 set thread context of 1404 2156 spoolsv.exe 182 PID 3564 set thread context of 320 3564 explorer.exe 185 PID 2268 set thread context of 3672 2268 spoolsv.exe 188 PID 1828 set thread context of 4236 1828 explorer.exe 191 PID 4376 set thread context of 3476 4376 spoolsv.exe 194 PID 2484 set thread context of 1664 2484 explorer.exe 196 PID 4380 set thread context of 4712 4380 spoolsv.exe 198 PID 640 set thread context of 4576 640 explorer.exe 201 PID 5012 set thread context of 2588 5012 spoolsv.exe 204 PID 4828 set thread context of 4408 4828 explorer.exe 207 PID 1224 set thread context of 552 1224 spoolsv.exe 211 PID 2728 set thread context of 4468 2728 explorer.exe 213 PID 972 set thread context of 4284 972 spoolsv.exe 215 PID 4744 set thread context of 2716 4744 explorer.exe 217 PID 1152 set thread context of 3120 1152 spoolsv.exe 219 PID 3080 set thread context of 2276 3080 spoolsv.exe 220 PID 4076 set thread context of 3100 4076 spoolsv.exe 223 PID 1092 set thread context of 1488 1092 spoolsv.exe 224 PID 4944 set thread context of 2700 4944 explorer.exe 225 PID 1004 set thread context of 3720 1004 spoolsv.exe 227 PID 3624 set thread context of 3812 3624 spoolsv.exe 229 PID 3692 set thread context of 4452 3692 spoolsv.exe 231 PID 3804 set thread context of 4832 3804 explorer.exe 233 PID 1872 set thread context of 212 1872 spoolsv.exe 234 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4316 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 4316 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4548 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4316 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 4316 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 3688 spoolsv.exe 3688 spoolsv.exe 5060 spoolsv.exe 5060 spoolsv.exe 2588 spoolsv.exe 2588 spoolsv.exe 4396 spoolsv.exe 4396 spoolsv.exe 4472 spoolsv.exe 4472 spoolsv.exe 1472 spoolsv.exe 1472 spoolsv.exe 3388 spoolsv.exe 3388 spoolsv.exe 3124 spoolsv.exe 3124 spoolsv.exe 1860 spoolsv.exe 1860 spoolsv.exe 4628 spoolsv.exe 4628 spoolsv.exe 3028 spoolsv.exe 3028 spoolsv.exe 4716 spoolsv.exe 4716 spoolsv.exe 4836 spoolsv.exe 4836 spoolsv.exe 1640 spoolsv.exe 1640 spoolsv.exe 1900 spoolsv.exe 1900 spoolsv.exe 1180 spoolsv.exe 1180 spoolsv.exe 3272 spoolsv.exe 3272 spoolsv.exe 2980 spoolsv.exe 2980 spoolsv.exe 4860 spoolsv.exe 4860 spoolsv.exe 2316 spoolsv.exe 2316 spoolsv.exe 1856 spoolsv.exe 1856 spoolsv.exe 3608 spoolsv.exe 3608 spoolsv.exe 4868 spoolsv.exe 4868 spoolsv.exe 3464 spoolsv.exe 3464 spoolsv.exe 4368 spoolsv.exe 4368 spoolsv.exe 1884 spoolsv.exe 1884 spoolsv.exe 4764 spoolsv.exe 4764 spoolsv.exe 3604 spoolsv.exe 3604 spoolsv.exe 1976 spoolsv.exe 1976 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 1460 4028 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 84 PID 4028 wrote to memory of 1460 4028 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 84 PID 4028 wrote to memory of 4316 4028 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 93 PID 4028 wrote to memory of 4316 4028 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 93 PID 4028 wrote to memory of 4316 4028 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 93 PID 4028 wrote to memory of 4316 4028 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 93 PID 4028 wrote to memory of 4316 4028 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 93 PID 4316 wrote to memory of 3572 4316 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 94 PID 4316 wrote to memory of 3572 4316 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 94 PID 4316 wrote to memory of 3572 4316 406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe 94 PID 3572 wrote to memory of 4548 3572 explorer.exe 97 PID 3572 wrote to memory of 4548 3572 explorer.exe 97 PID 3572 wrote to memory of 4548 3572 explorer.exe 97 PID 3572 wrote to memory of 4548 3572 explorer.exe 97 PID 3572 wrote to memory of 4548 3572 explorer.exe 97 PID 4548 wrote to memory of 4320 4548 explorer.exe 98 PID 4548 wrote to memory of 4320 4548 explorer.exe 98 PID 4548 wrote to memory of 4320 4548 explorer.exe 98 PID 4548 wrote to memory of 4048 4548 explorer.exe 99 PID 4548 wrote to memory of 4048 4548 explorer.exe 99 PID 4548 wrote to memory of 4048 4548 explorer.exe 99 PID 4548 wrote to memory of 1700 4548 explorer.exe 100 PID 4548 wrote to memory of 1700 4548 explorer.exe 100 PID 4548 wrote to memory of 1700 4548 explorer.exe 100 PID 4548 wrote to memory of 3544 4548 explorer.exe 101 PID 4548 wrote to memory of 3544 4548 explorer.exe 101 PID 4548 wrote to memory of 3544 4548 explorer.exe 101 PID 4548 wrote to memory of 2780 4548 explorer.exe 102 PID 4548 wrote to memory of 2780 4548 explorer.exe 102 PID 4548 wrote to memory of 2780 4548 explorer.exe 102 PID 4548 wrote to memory of 3084 4548 explorer.exe 103 PID 4548 wrote to memory of 3084 4548 explorer.exe 103 PID 4548 wrote to memory of 3084 4548 explorer.exe 103 PID 4548 wrote to memory of 232 4548 explorer.exe 104 PID 4548 wrote to memory of 232 4548 explorer.exe 104 PID 4548 wrote to memory of 232 4548 explorer.exe 104 PID 4548 wrote to memory of 3820 4548 explorer.exe 105 PID 4548 wrote to memory of 3820 4548 explorer.exe 105 PID 4548 wrote to memory of 3820 4548 explorer.exe 105 PID 4548 wrote to memory of 3768 4548 explorer.exe 106 PID 4548 wrote to memory of 3768 4548 explorer.exe 106 PID 4548 wrote to memory of 3768 4548 explorer.exe 106 PID 4548 wrote to memory of 4404 4548 explorer.exe 107 PID 4548 wrote to memory of 4404 4548 explorer.exe 107 PID 4548 wrote to memory of 4404 4548 explorer.exe 107 PID 4548 wrote to memory of 1940 4548 explorer.exe 108 PID 4548 wrote to memory of 1940 4548 explorer.exe 108 PID 4548 wrote to memory of 1940 4548 explorer.exe 108 PID 4548 wrote to memory of 3228 4548 explorer.exe 109 PID 4548 wrote to memory of 3228 4548 explorer.exe 109 PID 4548 wrote to memory of 3228 4548 explorer.exe 109 PID 4548 wrote to memory of 3636 4548 explorer.exe 110 PID 4548 wrote to memory of 3636 4548 explorer.exe 110 PID 4548 wrote to memory of 3636 4548 explorer.exe 110 PID 4548 wrote to memory of 3180 4548 explorer.exe 111 PID 4548 wrote to memory of 3180 4548 explorer.exe 111 PID 4548 wrote to memory of 3180 4548 explorer.exe 111 PID 4548 wrote to memory of 2352 4548 explorer.exe 112 PID 4548 wrote to memory of 2352 4548 explorer.exe 112 PID 4548 wrote to memory of 2352 4548 explorer.exe 112 PID 4548 wrote to memory of 628 4548 explorer.exe 113 PID 4548 wrote to memory of 628 4548 explorer.exe 113 PID 4548 wrote to memory of 628 4548 explorer.exe 113 PID 4548 wrote to memory of 3572 4548 explorer.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe"C:\Users\Admin\AppData\Local\Temp\406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe"C:\Users\Admin\AppData\Local\Temp\406b9b60b2b43b26fd8f4aebd0e5d4177eb2f1c146598e9ec10aa79b01339c5e.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4316 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3572 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4548 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4320 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3688 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3564 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:320
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4048 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5060
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1700 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2588
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3544 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4396
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2780 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4472
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1472
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:232 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3388 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1828 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4236
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3820 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3124
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3768 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1860
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4404 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1940 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3028
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3228 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4716 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2484 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:1664
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3636 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3180 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2352 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1900
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:628 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3572 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3272 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:640 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4576
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2260 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2980
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:960 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4860
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2960 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2076 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1856 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4828 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4408
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3716 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3608
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1876 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4868
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3328 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3464
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4412 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4368
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1252 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1884
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4028 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4764 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2728 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4468
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:316 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3604
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2976 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1976
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4920 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2052 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2560
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4744 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4540 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3304
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1348 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2448
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2156 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1404 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4944 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2268 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3672 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3804 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4832
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4376 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3476
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3456
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4380 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4712
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4980
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5012 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2588 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3632
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1224 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:552 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:2964
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:972 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4284 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4104
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1152 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3120
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3080 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2276
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4612
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4076 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3100
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1092 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1488
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1004 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3720
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3300
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3624 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3812
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3692 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4452
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4880
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1872 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:212
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2376
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:396
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4536
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:952
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:3948
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4300
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3864
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3428
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:4504
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:4620
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2436
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:920
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:864
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3156
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:888
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5024
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4200
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2096
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2804
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD57a3daebcefd1e7a24d47e93f7677364a
SHA19c866afb1b3b84547ce287551c0aff7dfa93063f
SHA256660fef20c09a769728e57621443fad1dcc0f00781db5b9849b53f0b88919b623
SHA51207e92f1817435c08a8471d22ec2ee2aa1d4746ed0f945a97b9f4369b81b331527034c71adcdcc1de5af34a8fbd2c21e33a0499f368b7de950fe12022c2d06d11
-
Filesize
2.2MB
MD52c4cb6e6c54280d9b472236bf1784ae1
SHA1bcf91b0562ea2ff5834fabb136c512a3c2dc1948
SHA256e806f24c07b3d6ab01440d7ff34e59642ad240eef676307728f1c9a03b55943b
SHA5124cda10ec80a345ca3e28e65ea253e032a9bf8956ddfb8f20a51f0c2d83023c1e731f50470f5ade7d8038818b282cfa76380d978f232e3281880f31179a28f026