Analysis
-
max time kernel
111s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 09:30
Behavioral task
behavioral1
Sample
674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe
Resource
win7-20241010-en
General
-
Target
674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe
-
Size
2.2MB
-
MD5
2a66f692bf182524d46bf8ab7e1dcf90
-
SHA1
f8842d475ac75f4455eb3519732e91349f820a9a
-
SHA256
674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11
-
SHA512
01058c956a02b6f5b67cec5a37a2b37390d7fbf51c54a4176dced25b6274978a1ebc1ede056085307f2b8c86f4a5f69fdde015d6be3e89cc9b9e0568fd1c3885
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZK:0UzeyQMS4DqodCnoe+iitjWww2
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe -
Executes dropped EXE 64 IoCs
pid Process 4060 explorer.exe 5008 explorer.exe 4808 spoolsv.exe 3400 spoolsv.exe 4412 spoolsv.exe 4480 spoolsv.exe 2164 spoolsv.exe 2352 spoolsv.exe 3416 spoolsv.exe 2988 spoolsv.exe 5064 spoolsv.exe 3984 spoolsv.exe 4176 spoolsv.exe 4228 spoolsv.exe 2792 spoolsv.exe 996 spoolsv.exe 628 spoolsv.exe 4544 spoolsv.exe 1532 spoolsv.exe 1860 spoolsv.exe 4576 spoolsv.exe 1304 spoolsv.exe 32 spoolsv.exe 956 spoolsv.exe 2992 spoolsv.exe 2224 spoolsv.exe 4428 spoolsv.exe 64 spoolsv.exe 4392 spoolsv.exe 2856 explorer.exe 3192 spoolsv.exe 3908 spoolsv.exe 4876 spoolsv.exe 1556 spoolsv.exe 4036 spoolsv.exe 4348 explorer.exe 1680 spoolsv.exe 1700 spoolsv.exe 2640 spoolsv.exe 2828 spoolsv.exe 3532 spoolsv.exe 4304 spoolsv.exe 4772 explorer.exe 1084 spoolsv.exe 3080 spoolsv.exe 4884 spoolsv.exe 2240 spoolsv.exe 516 explorer.exe 1644 spoolsv.exe 4520 spoolsv.exe 1428 spoolsv.exe 820 spoolsv.exe 1164 spoolsv.exe 3660 explorer.exe 416 spoolsv.exe 2276 spoolsv.exe 224 spoolsv.exe 1440 spoolsv.exe 1976 explorer.exe 1148 spoolsv.exe 1316 spoolsv.exe 4216 spoolsv.exe 2120 spoolsv.exe 2172 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 26 IoCs
description pid Process procid_target PID 3544 set thread context of 3284 3544 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 100 PID 4060 set thread context of 5008 4060 explorer.exe 106 PID 4808 set thread context of 4392 4808 spoolsv.exe 134 PID 3400 set thread context of 3192 3400 spoolsv.exe 136 PID 4412 set thread context of 4876 4412 spoolsv.exe 138 PID 4480 set thread context of 1556 4480 spoolsv.exe 139 PID 2164 set thread context of 4036 2164 spoolsv.exe 140 PID 2352 set thread context of 1680 2352 spoolsv.exe 142 PID 3416 set thread context of 2640 3416 spoolsv.exe 144 PID 2988 set thread context of 2828 2988 spoolsv.exe 145 PID 5064 set thread context of 3532 5064 spoolsv.exe 146 PID 3984 set thread context of 1084 3984 spoolsv.exe 149 PID 4176 set thread context of 3080 4176 spoolsv.exe 150 PID 4228 set thread context of 2240 4228 spoolsv.exe 152 PID 2792 set thread context of 1644 2792 spoolsv.exe 154 PID 996 set thread context of 4520 996 spoolsv.exe 155 PID 628 set thread context of 820 628 spoolsv.exe 158 PID 4544 set thread context of 1164 4544 spoolsv.exe 159 PID 1532 set thread context of 416 1532 spoolsv.exe 161 PID 1860 set thread context of 2276 1860 spoolsv.exe 162 PID 4576 set thread context of 1440 4576 spoolsv.exe 164 PID 1304 set thread context of 1148 1304 spoolsv.exe 166 PID 32 set thread context of 1316 32 spoolsv.exe 167 PID 956 set thread context of 4216 956 spoolsv.exe 168 PID 2992 set thread context of 2172 2992 spoolsv.exe 170 PID 2224 set thread context of 2280 2224 spoolsv.exe 172 -
Drops file in Windows directory 43 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3284 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 3284 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe -
Suspicious use of SetWindowsHookEx 54 IoCs
pid Process 3284 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 3284 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 4392 spoolsv.exe 4392 spoolsv.exe 3192 spoolsv.exe 3192 spoolsv.exe 4876 spoolsv.exe 4876 spoolsv.exe 1556 spoolsv.exe 1556 spoolsv.exe 4036 spoolsv.exe 4036 spoolsv.exe 1680 spoolsv.exe 1680 spoolsv.exe 2640 spoolsv.exe 2640 spoolsv.exe 2828 spoolsv.exe 2828 spoolsv.exe 3532 spoolsv.exe 3532 spoolsv.exe 1084 spoolsv.exe 1084 spoolsv.exe 3080 spoolsv.exe 3080 spoolsv.exe 2240 spoolsv.exe 2240 spoolsv.exe 1644 spoolsv.exe 1644 spoolsv.exe 4520 spoolsv.exe 4520 spoolsv.exe 820 spoolsv.exe 820 spoolsv.exe 1164 spoolsv.exe 1164 spoolsv.exe 416 spoolsv.exe 416 spoolsv.exe 2276 spoolsv.exe 2276 spoolsv.exe 1440 spoolsv.exe 1440 spoolsv.exe 1148 spoolsv.exe 1148 spoolsv.exe 1316 spoolsv.exe 1316 spoolsv.exe 4216 spoolsv.exe 4216 spoolsv.exe 2172 spoolsv.exe 2172 spoolsv.exe 2280 spoolsv.exe 2280 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3544 wrote to memory of 2680 3544 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 84 PID 3544 wrote to memory of 2680 3544 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 84 PID 3544 wrote to memory of 3284 3544 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 100 PID 3544 wrote to memory of 3284 3544 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 100 PID 3544 wrote to memory of 3284 3544 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 100 PID 3544 wrote to memory of 3284 3544 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 100 PID 3544 wrote to memory of 3284 3544 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 100 PID 3284 wrote to memory of 4060 3284 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 101 PID 3284 wrote to memory of 4060 3284 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 101 PID 3284 wrote to memory of 4060 3284 674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe 101 PID 4060 wrote to memory of 5008 4060 explorer.exe 106 PID 4060 wrote to memory of 5008 4060 explorer.exe 106 PID 4060 wrote to memory of 5008 4060 explorer.exe 106 PID 4060 wrote to memory of 5008 4060 explorer.exe 106 PID 4060 wrote to memory of 5008 4060 explorer.exe 106 PID 5008 wrote to memory of 4808 5008 explorer.exe 107 PID 5008 wrote to memory of 4808 5008 explorer.exe 107 PID 5008 wrote to memory of 4808 5008 explorer.exe 107 PID 5008 wrote to memory of 3400 5008 explorer.exe 108 PID 5008 wrote to memory of 3400 5008 explorer.exe 108 PID 5008 wrote to memory of 3400 5008 explorer.exe 108 PID 5008 wrote to memory of 4412 5008 explorer.exe 109 PID 5008 wrote to memory of 4412 5008 explorer.exe 109 PID 5008 wrote to memory of 4412 5008 explorer.exe 109 PID 5008 wrote to memory of 4480 5008 explorer.exe 110 PID 5008 wrote to memory of 4480 5008 explorer.exe 110 PID 5008 wrote to memory of 4480 5008 explorer.exe 110 PID 5008 wrote to memory of 2164 5008 explorer.exe 111 PID 5008 wrote to memory of 2164 5008 explorer.exe 111 PID 5008 wrote to memory of 2164 5008 explorer.exe 111 PID 5008 wrote to memory of 2352 5008 explorer.exe 112 PID 5008 wrote to memory of 2352 5008 explorer.exe 112 PID 5008 wrote to memory of 2352 5008 explorer.exe 112 PID 5008 wrote to memory of 3416 5008 explorer.exe 113 PID 5008 wrote to memory of 3416 5008 explorer.exe 113 PID 5008 wrote to memory of 3416 5008 explorer.exe 113 PID 5008 wrote to memory of 2988 5008 explorer.exe 115 PID 5008 wrote to memory of 2988 5008 explorer.exe 115 PID 5008 wrote to memory of 2988 5008 explorer.exe 115 PID 5008 wrote to memory of 5064 5008 explorer.exe 116 PID 5008 wrote to memory of 5064 5008 explorer.exe 116 PID 5008 wrote to memory of 5064 5008 explorer.exe 116 PID 5008 wrote to memory of 3984 5008 explorer.exe 117 PID 5008 wrote to memory of 3984 5008 explorer.exe 117 PID 5008 wrote to memory of 3984 5008 explorer.exe 117 PID 5008 wrote to memory of 4176 5008 explorer.exe 118 PID 5008 wrote to memory of 4176 5008 explorer.exe 118 PID 5008 wrote to memory of 4176 5008 explorer.exe 118 PID 5008 wrote to memory of 4228 5008 explorer.exe 119 PID 5008 wrote to memory of 4228 5008 explorer.exe 119 PID 5008 wrote to memory of 4228 5008 explorer.exe 119 PID 5008 wrote to memory of 2792 5008 explorer.exe 120 PID 5008 wrote to memory of 2792 5008 explorer.exe 120 PID 5008 wrote to memory of 2792 5008 explorer.exe 120 PID 5008 wrote to memory of 996 5008 explorer.exe 121 PID 5008 wrote to memory of 996 5008 explorer.exe 121 PID 5008 wrote to memory of 996 5008 explorer.exe 121 PID 5008 wrote to memory of 628 5008 explorer.exe 122 PID 5008 wrote to memory of 628 5008 explorer.exe 122 PID 5008 wrote to memory of 628 5008 explorer.exe 122 PID 5008 wrote to memory of 4544 5008 explorer.exe 123 PID 5008 wrote to memory of 4544 5008 explorer.exe 123 PID 5008 wrote to memory of 4544 5008 explorer.exe 123 PID 5008 wrote to memory of 1532 5008 explorer.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe"C:\Users\Admin\AppData\Local\Temp\674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe"C:\Users\Admin\AppData\Local\Temp\674e0187d5ea032e846d36305a141cdc746eb8e64616cbd474e2447d5769ed11N.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3284 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5008 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4808 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4392 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2856 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2288
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3400 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3192
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4412 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4876
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4480 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2164 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4036 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4348
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2352 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3416 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2988 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5064 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3532 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4772
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3984 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4176 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3080
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4228 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2240 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:516
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2792 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1644
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:996 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4520
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:628 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:820
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4544 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1164 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3660
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1532 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:416
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1860 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2276
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4576 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1440 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1976
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1304 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1148
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:32 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:956 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4216
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2992 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2172 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5080
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2224 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2280
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4428 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:64 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4476
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2480
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3908 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4028
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1580
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1700
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4304
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4884
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1428
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:224
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2120
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4516
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4484
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1872
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2216
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1072
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4364
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4632
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1936
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD57731e272f2c896c87332dbfbcd0d772e
SHA140f1d3aa545714b4c947dd866aed94d704078eb0
SHA2567a78b5fab2a14574965b88f193f814cc9b4d610d5fb0c6da29b580a955e8bdad
SHA512336d6f7d19ce471a120a5259f8c642f016122fac3f24066392169c9809e4ac6f26673515bd70215e90b092abd11b117cc7852d9af4825bde3b426102b723a14a
-
Filesize
2.2MB
MD588a86cccf31883f7d4d72e131ff84fcd
SHA13ee648b032c7f8dad7ad746e77898d7ca6e92011
SHA25634bf6b04324951f7ec95f73542ed84a7b414b8cb802c7fb824e17577d77fed05
SHA5123a5b686519bd1b07a81eaf1aa375c2b0cc93b775091934b247e380155bd562b7baa9c635c92dac2c29bd1b59570a3b14693f2e3026f399e73ad21af86be962df