Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 21:40

General

  • Target

    f6e917d4568891491ec94199f43282f2_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    f6e917d4568891491ec94199f43282f2

  • SHA1

    406333eff8a7e1db5448a5461cd9d7dad0decebe

  • SHA256

    16aeca88dac6e3fb03a9d82372739d85662fbe4870a8d99231661f6f8efd80d4

  • SHA512

    e6b9ac11dcc05d40dbb5cb4c513728b07424e49195e3d7acdf40ac9ec4b59e4d9d71c39463dc590f4c29c1f9f605abcb726cd3bdbbd516076c9863491f263b18

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZy:0UzeyQMS4DqodCnoe+iitjWwwG

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 55 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6e917d4568891491ec94199f43282f2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6e917d4568891491ec94199f43282f2_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3696
      • C:\Users\Admin\AppData\Local\Temp\f6e917d4568891491ec94199f43282f2_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\f6e917d4568891491ec94199f43282f2_JaffaCakes118.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5068
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2868
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1096
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:3280
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4764
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:2168
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                      PID:1940
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:1008
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3948
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4936
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4228
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:4472
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4568
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:3724
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2016
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:632
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:5620
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:4540
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:3212
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3116
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:5072
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2460
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1632
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:1164
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3160
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4408
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3248
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:3552
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:5528
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:1716
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4508
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:3792
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4112
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:216
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:1808
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:1728
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:6096
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:316
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2996
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4556
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1584
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2112
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:3468
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:684
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2224
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3748
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4124
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:3784
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4028
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:1248
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:5704
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:1796
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4876
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:4520
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1492
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4432
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3320
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:1452
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Suspicious use of SetWindowsHookEx
                  PID:2020
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:2056
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                        PID:224
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:4840
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:4544
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:5008
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:908
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:3288
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:4380
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:1488
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:2740
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:3900
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:1604
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:2532
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:4812
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:1440
                      • \??\c:\windows\system\explorer.exe
                        "c:\windows\system\explorer.exe"
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:2512
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:1908
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:4964
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:3492
                      • \??\c:\windows\system\explorer.exe
                        "c:\windows\system\explorer.exe"
                        8⤵
                          PID:4044
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:3284
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:5520
                      • \??\c:\windows\system\explorer.exe
                        c:\windows\system\explorer.exe
                        7⤵
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:5568
                        • \??\c:\windows\system\explorer.exe
                          "c:\windows\system\explorer.exe"
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:4500
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:3448
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:3120
                      • \??\c:\windows\system\explorer.exe
                        c:\windows\system\explorer.exe
                        7⤵
                        • Drops file in Windows directory
                        PID:3456
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:1132
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:6024
                      • \??\c:\windows\system\explorer.exe
                        c:\windows\system\explorer.exe
                        7⤵
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:5968
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:4948
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                        PID:5988
                        • \??\c:\windows\system\explorer.exe
                          c:\windows\system\explorer.exe
                          7⤵
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:4460
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:2160
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                          PID:5996
                          • \??\c:\windows\system\explorer.exe
                            c:\windows\system\explorer.exe
                            7⤵
                            • Drops file in Windows directory
                            PID:6136
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:3332
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:1128
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:4188
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                            PID:5880
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Suspicious use of SetThreadContext
                          PID:3616
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                              PID:5360
                          • \??\c:\windows\system\spoolsv.exe
                            c:\windows\system\spoolsv.exe SE
                            5⤵
                            • Suspicious use of SetThreadContext
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:420
                            • \??\c:\windows\system\spoolsv.exe
                              "c:\windows\system\spoolsv.exe"
                              6⤵
                                PID:5840
                            • \??\c:\windows\system\spoolsv.exe
                              c:\windows\system\spoolsv.exe SE
                              5⤵
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              PID:3756
                              • \??\c:\windows\system\spoolsv.exe
                                "c:\windows\system\spoolsv.exe"
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:5728
                            • \??\c:\windows\system\spoolsv.exe
                              c:\windows\system\spoolsv.exe SE
                              5⤵
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:2928
                              • \??\c:\windows\system\spoolsv.exe
                                "c:\windows\system\spoolsv.exe"
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:2304
                            • \??\c:\windows\system\spoolsv.exe
                              c:\windows\system\spoolsv.exe SE
                              5⤵
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:180
                              • \??\c:\windows\system\spoolsv.exe
                                "c:\windows\system\spoolsv.exe"
                                6⤵
                                  PID:2096
                              • \??\c:\windows\system\spoolsv.exe
                                c:\windows\system\spoolsv.exe SE
                                5⤵
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:5132
                                • \??\c:\windows\system\spoolsv.exe
                                  "c:\windows\system\spoolsv.exe"
                                  6⤵
                                    PID:4944
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Suspicious use of SetThreadContext
                                  • Drops file in Windows directory
                                  PID:5428
                                  • \??\c:\windows\system\spoolsv.exe
                                    "c:\windows\system\spoolsv.exe"
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5732
                                    • \??\c:\windows\system\explorer.exe
                                      c:\windows\system\explorer.exe
                                      7⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:5816
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5928
                                  • \??\c:\windows\system\spoolsv.exe
                                    "c:\windows\system\spoolsv.exe"
                                    6⤵
                                      PID:5140
                                      • \??\c:\windows\system\explorer.exe
                                        c:\windows\system\explorer.exe
                                        7⤵
                                          PID:2412
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:5364
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      PID:6072
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      PID:5388
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Drops file in Windows directory
                                      PID:3264
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      PID:5884
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      PID:5288
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      PID:5956
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Drops file in Windows directory
                                      PID:5260
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      PID:3308
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Drops file in Windows directory
                                      PID:2888
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Drops file in Windows directory
                                      PID:4308
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                        PID:5076
                                      • \??\c:\windows\system\spoolsv.exe
                                        c:\windows\system\spoolsv.exe SE
                                        5⤵
                                          PID:3832
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                  1⤵
                                    PID:2676

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Windows\Parameters.ini

                                    Filesize

                                    74B

                                    MD5

                                    6687785d6a31cdf9a5f80acb3abc459b

                                    SHA1

                                    1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

                                    SHA256

                                    3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

                                    SHA512

                                    5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

                                  • C:\Windows\System\explorer.exe

                                    Filesize

                                    2.2MB

                                    MD5

                                    ab50c491b810088c1029fafac5fed1b2

                                    SHA1

                                    0d43c552bace6cc1251730bb98d7b66e42fff098

                                    SHA256

                                    f2958eceb64bd1801cd3a683a03584f69a412604c9ef617d087008c052a741e4

                                    SHA512

                                    6283aedbf7d3b58a3899f7b9f42e0ea445f1158ef79bbc0c2cb3a825ff334cd3ca467658e1ccce5c23d4d24149976e29317d6082de5dbdafcb8439864495bd90

                                  • C:\Windows\System\spoolsv.exe

                                    Filesize

                                    2.2MB

                                    MD5

                                    02c91b772ba43f07c163b8b04287de2f

                                    SHA1

                                    b0eea123d62deb2ac86616afb2bdc92904c12d52

                                    SHA256

                                    0cb7a5de997d15f2823090bc46e7e16a30984d5d14127d4cdee891bc98ec1593

                                    SHA512

                                    3c38126882af0c8cdbd20f125861e1c7c47e2a8c5b9fed9f882ff19b9f531053cdd5ef9400408954ed0921819af47bbf22c86f26c868f999cbbafa5361b39cb1

                                  • memory/216-1555-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/224-4725-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/316-1622-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/684-1858-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/908-2925-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/1008-1965-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/1008-921-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/1096-99-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/1096-704-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/1096-4219-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/1128-4741-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/1164-1318-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/1452-2064-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/1492-2789-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/1492-2785-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/1584-2574-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/1604-2960-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/1632-2199-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/1716-1452-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/1796-1961-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/1808-2543-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/1808-2745-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/1940-3443-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/2016-2325-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/2016-2170-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/2096-4905-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/2112-1741-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/2224-2596-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/2224-2592-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/2304-4897-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/2460-1317-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/2512-4745-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/2740-2941-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/2868-100-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/2868-95-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/2996-2560-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/2996-2565-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/3116-1261-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/3120-3882-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/3120-4007-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/3160-2288-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/3212-2178-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/3248-2358-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/3248-2525-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/3280-798-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/3280-1954-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/3320-2847-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/3320-2850-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/3724-1089-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/3748-1936-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/3784-1937-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/3792-1508-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/3948-1963-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4028-2767-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4044-4890-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4052-0-0x0000000000700000-0x0000000000701000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4052-31-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4052-32-0x0000000000700000-0x0000000000701000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4052-39-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4112-2469-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4112-2471-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4124-2683-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4124-2679-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4228-1985-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4380-2935-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4408-1381-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4432-1969-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4472-1043-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4472-2066-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4500-5086-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4508-2369-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4508-2364-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4520-1968-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4540-1140-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4544-2913-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4556-1684-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4568-2065-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4568-2069-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4764-2152-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4764-1952-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4812-3204-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4876-2775-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4936-987-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4936-1987-0x0000000000400000-0x00000000005D3000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4944-4981-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4944-4963-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4964-3361-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5068-84-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5068-82-0x0000000000440000-0x0000000000509000-memory.dmp

                                    Filesize

                                    804KB

                                  • memory/5068-34-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5068-35-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5072-2189-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5140-5227-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5360-4764-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5360-4759-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5520-3857-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5528-3964-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5620-3755-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5704-4579-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5732-5076-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5732-5210-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5840-4871-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5880-4752-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5988-4490-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5996-4712-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/6024-4267-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/6096-4278-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB