Analysis
-
max time kernel
120s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 10:48
Behavioral task
behavioral1
Sample
68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe
Resource
win7-20241010-en
General
-
Target
68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe
-
Size
2.2MB
-
MD5
e1f910a1d7b8a867a44da7d1ef8cfe40
-
SHA1
5d6bec7236235e967aafafd5d2afe3dc5cdd30a2
-
SHA256
68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4
-
SHA512
b40a9c09acea60f9b25ae3fa705503775075ec7e8df3c2755979baf4fdb9b24132a3cbcb7a1969b441142ab24f138ff394fb2eb7ef647bb3ba5a705cb54bcefb
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZa:0UzeyQMS4DqodCnoe+iitjWwwe
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe -
Executes dropped EXE 45 IoCs
pid Process 3528 explorer.exe 852 explorer.exe 1088 spoolsv.exe 4028 spoolsv.exe 3808 spoolsv.exe 804 spoolsv.exe 4376 spoolsv.exe 744 spoolsv.exe 4980 spoolsv.exe 2896 spoolsv.exe 4232 spoolsv.exe 3596 spoolsv.exe 3760 spoolsv.exe 3444 spoolsv.exe 3036 spoolsv.exe 3584 spoolsv.exe 4444 spoolsv.exe 4464 spoolsv.exe 1492 spoolsv.exe 1116 spoolsv.exe 3496 spoolsv.exe 1396 spoolsv.exe 3408 spoolsv.exe 2204 spoolsv.exe 2640 spoolsv.exe 3136 spoolsv.exe 3088 spoolsv.exe 2052 spoolsv.exe 1308 spoolsv.exe 4828 explorer.exe 1564 spoolsv.exe 856 spoolsv.exe 1836 spoolsv.exe 2020 spoolsv.exe 3156 spoolsv.exe 2904 explorer.exe 4872 spoolsv.exe 4308 spoolsv.exe 5004 spoolsv.exe 2564 spoolsv.exe 4624 explorer.exe 4272 spoolsv.exe 4852 spoolsv.exe 3360 spoolsv.exe 4728 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 5076 set thread context of 4936 5076 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 98 PID 3528 set thread context of 852 3528 explorer.exe 103 PID 1088 set thread context of 1308 1088 spoolsv.exe 131 PID 4028 set thread context of 856 4028 spoolsv.exe 134 PID 3808 set thread context of 1836 3808 spoolsv.exe 135 PID 804 set thread context of 3156 804 spoolsv.exe 137 PID 4376 set thread context of 4872 4376 spoolsv.exe 139 PID 744 set thread context of 4308 744 spoolsv.exe 140 PID 4980 set thread context of 2564 4980 spoolsv.exe 142 PID 2896 set thread context of 4272 2896 spoolsv.exe 144 PID 4232 set thread context of 3360 4232 spoolsv.exe 146 -
Drops file in Windows directory 36 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4936 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 4936 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 4936 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 4936 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 1308 spoolsv.exe 1308 spoolsv.exe 856 spoolsv.exe 856 spoolsv.exe 1836 spoolsv.exe 1836 spoolsv.exe 3156 spoolsv.exe 3156 spoolsv.exe 4872 spoolsv.exe 4872 spoolsv.exe 4308 spoolsv.exe 4308 spoolsv.exe 2564 spoolsv.exe 2564 spoolsv.exe 4272 spoolsv.exe 4272 spoolsv.exe 3360 spoolsv.exe 3360 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5076 wrote to memory of 3112 5076 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 86 PID 5076 wrote to memory of 3112 5076 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 86 PID 5076 wrote to memory of 4936 5076 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 98 PID 5076 wrote to memory of 4936 5076 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 98 PID 5076 wrote to memory of 4936 5076 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 98 PID 5076 wrote to memory of 4936 5076 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 98 PID 5076 wrote to memory of 4936 5076 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 98 PID 4936 wrote to memory of 3528 4936 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 99 PID 4936 wrote to memory of 3528 4936 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 99 PID 4936 wrote to memory of 3528 4936 68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe 99 PID 3528 wrote to memory of 852 3528 explorer.exe 103 PID 3528 wrote to memory of 852 3528 explorer.exe 103 PID 3528 wrote to memory of 852 3528 explorer.exe 103 PID 3528 wrote to memory of 852 3528 explorer.exe 103 PID 3528 wrote to memory of 852 3528 explorer.exe 103 PID 852 wrote to memory of 1088 852 explorer.exe 104 PID 852 wrote to memory of 1088 852 explorer.exe 104 PID 852 wrote to memory of 1088 852 explorer.exe 104 PID 852 wrote to memory of 4028 852 explorer.exe 105 PID 852 wrote to memory of 4028 852 explorer.exe 105 PID 852 wrote to memory of 4028 852 explorer.exe 105 PID 852 wrote to memory of 3808 852 explorer.exe 106 PID 852 wrote to memory of 3808 852 explorer.exe 106 PID 852 wrote to memory of 3808 852 explorer.exe 106 PID 852 wrote to memory of 804 852 explorer.exe 107 PID 852 wrote to memory of 804 852 explorer.exe 107 PID 852 wrote to memory of 804 852 explorer.exe 107 PID 852 wrote to memory of 4376 852 explorer.exe 108 PID 852 wrote to memory of 4376 852 explorer.exe 108 PID 852 wrote to memory of 4376 852 explorer.exe 108 PID 852 wrote to memory of 744 852 explorer.exe 109 PID 852 wrote to memory of 744 852 explorer.exe 109 PID 852 wrote to memory of 744 852 explorer.exe 109 PID 852 wrote to memory of 4980 852 explorer.exe 110 PID 852 wrote to memory of 4980 852 explorer.exe 110 PID 852 wrote to memory of 4980 852 explorer.exe 110 PID 852 wrote to memory of 2896 852 explorer.exe 111 PID 852 wrote to memory of 2896 852 explorer.exe 111 PID 852 wrote to memory of 2896 852 explorer.exe 111 PID 852 wrote to memory of 4232 852 explorer.exe 112 PID 852 wrote to memory of 4232 852 explorer.exe 112 PID 852 wrote to memory of 4232 852 explorer.exe 112 PID 852 wrote to memory of 3596 852 explorer.exe 113 PID 852 wrote to memory of 3596 852 explorer.exe 113 PID 852 wrote to memory of 3596 852 explorer.exe 113 PID 852 wrote to memory of 3760 852 explorer.exe 115 PID 852 wrote to memory of 3760 852 explorer.exe 115 PID 852 wrote to memory of 3760 852 explorer.exe 115 PID 852 wrote to memory of 3444 852 explorer.exe 116 PID 852 wrote to memory of 3444 852 explorer.exe 116 PID 852 wrote to memory of 3444 852 explorer.exe 116 PID 852 wrote to memory of 3036 852 explorer.exe 117 PID 852 wrote to memory of 3036 852 explorer.exe 117 PID 852 wrote to memory of 3036 852 explorer.exe 117 PID 852 wrote to memory of 3584 852 explorer.exe 118 PID 852 wrote to memory of 3584 852 explorer.exe 118 PID 852 wrote to memory of 3584 852 explorer.exe 118 PID 852 wrote to memory of 4444 852 explorer.exe 119 PID 852 wrote to memory of 4444 852 explorer.exe 119 PID 852 wrote to memory of 4444 852 explorer.exe 119 PID 852 wrote to memory of 4464 852 explorer.exe 120 PID 852 wrote to memory of 4464 852 explorer.exe 120 PID 852 wrote to memory of 4464 852 explorer.exe 120 PID 852 wrote to memory of 1492 852 explorer.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe"C:\Users\Admin\AppData\Local\Temp\68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe"C:\Users\Admin\AppData\Local\Temp\68715b73b8823adcf7a4e14925f0a8c50e54887a4d58a9fb909e2cc1992f5da4N.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4936 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1088 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1308 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4828 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4068
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4028 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:856
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3808 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:804 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3156 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2904 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2064
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4376 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4872
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:744 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4308
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4980 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2564 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4624
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2896 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4272
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4232 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3360 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4728
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3596 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2536
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3760 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4024
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3444 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1912
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4460
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3036 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1352
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3584 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1804
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4444 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1992
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1984
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4464 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2268
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1492 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2220
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1116 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4628
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3212
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3496 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1396 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2416
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3408 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4672
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2204 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1156
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2640 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3396
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1276
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3136 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3456
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3088 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3116
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1044
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2052 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4492
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:916
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1564 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4288
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4816
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2020 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1932
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4260
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5004 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1212
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4852
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3732
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4504
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2816
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3548
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3556
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4296
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4080
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3748
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4148
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4788
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4276
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5072
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5093a5e6193f3d46e0fbfa5ac5b8039d5
SHA16c6aa23a73f4812da9ce83b05a9324b38616221c
SHA256e304626e368f6cdfc029276264eb5987f77512199357ffcd80fac861ea4bdbce
SHA512f8e0b2778768fe43a4ef483c06950ea86e766e83d574be0e4e51132489ddb85502c6b1120280e28a1d1399f67ed37b9b044523c38ebb44f631a3f6318bd30856
-
Filesize
2.2MB
MD59f61d8baa1470c6e92c09cde5d92ef21
SHA19812fc93bfe71c35fb03778cfa6fe2eee3c07c7d
SHA25608b897edc375f64cbb710dd26270ae1407a661cba580f888305022fdeae3de29
SHA51269b12da29b29d1ebeca9f5814b100e40bd1ac5ee5fc4285e9821678ef85ac7fe939173db12f71d6c07806211f233f58f7668ee74d101df8233e88002f696f2b6