Analysis
-
max time kernel
109s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 23:48
Behavioral task
behavioral1
Sample
743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe
Resource
win7-20240903-en
General
-
Target
743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe
-
Size
2.2MB
-
MD5
e02000a7e7b112b3d488e804b6497833
-
SHA1
abc28b5cd6da70e966ecb9eb6bcbd8e3f05cecc7
-
SHA256
743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff
-
SHA512
3668c866003150b021cb419e2d02361cf3dad9a8b12521a0e0fb008ada2d68b5484b2ca9bf323a370154307bca8374a78e7f7d11f2c78b8421f743727bd3ed12
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZH:0UzeyQMS4DqodCnoe+iitjWwwL
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe -
Executes dropped EXE 56 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exepid process 2284 explorer.exe 1272 explorer.exe 4916 spoolsv.exe 3400 spoolsv.exe 4188 spoolsv.exe 4484 spoolsv.exe 2508 spoolsv.exe 4444 spoolsv.exe 660 spoolsv.exe 3088 spoolsv.exe 2448 spoolsv.exe 1772 spoolsv.exe 2640 spoolsv.exe 4472 spoolsv.exe 4276 spoolsv.exe 4540 spoolsv.exe 3992 spoolsv.exe 184 spoolsv.exe 1404 spoolsv.exe 3180 spoolsv.exe 2260 spoolsv.exe 2088 spoolsv.exe 4940 spoolsv.exe 1744 spoolsv.exe 1896 explorer.exe 3232 spoolsv.exe 3896 spoolsv.exe 1424 spoolsv.exe 824 explorer.exe 4628 spoolsv.exe 3704 spoolsv.exe 4740 spoolsv.exe 3360 spoolsv.exe 4516 spoolsv.exe 3980 explorer.exe 4852 spoolsv.exe 1952 spoolsv.exe 1128 spoolsv.exe 4192 spoolsv.exe 4908 explorer.exe 1192 spoolsv.exe 768 spoolsv.exe 3960 spoolsv.exe 4960 spoolsv.exe 4296 explorer.exe 1892 spoolsv.exe 4260 spoolsv.exe 2308 spoolsv.exe 1380 spoolsv.exe 3364 explorer.exe 4600 spoolsv.exe 2320 spoolsv.exe 1284 spoolsv.exe 1704 explorer.exe 4128 spoolsv.exe 4992 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 17 IoCs
Processes:
743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 1524 set thread context of 3200 1524 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe PID 2284 set thread context of 1272 2284 explorer.exe explorer.exe PID 4916 set thread context of 1744 4916 spoolsv.exe spoolsv.exe PID 3400 set thread context of 3896 3400 spoolsv.exe spoolsv.exe PID 4188 set thread context of 1424 4188 spoolsv.exe spoolsv.exe PID 4484 set thread context of 4628 4484 spoolsv.exe spoolsv.exe PID 2508 set thread context of 4740 2508 spoolsv.exe spoolsv.exe PID 4444 set thread context of 4516 4444 spoolsv.exe spoolsv.exe PID 660 set thread context of 1952 660 spoolsv.exe spoolsv.exe PID 3088 set thread context of 1128 3088 spoolsv.exe spoolsv.exe PID 2448 set thread context of 1192 2448 spoolsv.exe spoolsv.exe PID 1772 set thread context of 4960 1772 spoolsv.exe spoolsv.exe PID 2640 set thread context of 4260 2640 spoolsv.exe spoolsv.exe PID 4472 set thread context of 1380 4472 spoolsv.exe spoolsv.exe PID 4276 set thread context of 2320 4276 spoolsv.exe spoolsv.exe PID 4540 set thread context of 1284 4540 spoolsv.exe spoolsv.exe PID 3992 set thread context of 4992 3992 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 43 IoCs
Processes:
spoolsv.exespoolsv.exeexplorer.exeexplorer.exe743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exespoolsv.exespoolsv.exespoolsv.exe743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exeexplorer.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 58 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
spoolsv.exespoolsv.exeexplorer.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exe743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exespoolsv.exespoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exeexplorer.exepid process 3200 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe 3200 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
Processes:
743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 3200 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe 3200 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1272 explorer.exe 1744 spoolsv.exe 1744 spoolsv.exe 3896 spoolsv.exe 3896 spoolsv.exe 1424 spoolsv.exe 1424 spoolsv.exe 4628 spoolsv.exe 4628 spoolsv.exe 4740 spoolsv.exe 4740 spoolsv.exe 4516 spoolsv.exe 4516 spoolsv.exe 1952 spoolsv.exe 1952 spoolsv.exe 1128 spoolsv.exe 1128 spoolsv.exe 1192 spoolsv.exe 1192 spoolsv.exe 4960 spoolsv.exe 4960 spoolsv.exe 4260 spoolsv.exe 4260 spoolsv.exe 1380 spoolsv.exe 1380 spoolsv.exe 2320 spoolsv.exe 2320 spoolsv.exe 1284 spoolsv.exe 1284 spoolsv.exe 4992 spoolsv.exe 4992 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exeexplorer.exeexplorer.exedescription pid process target process PID 1524 wrote to memory of 804 1524 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe splwow64.exe PID 1524 wrote to memory of 804 1524 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe splwow64.exe PID 1524 wrote to memory of 3200 1524 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe PID 1524 wrote to memory of 3200 1524 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe PID 1524 wrote to memory of 3200 1524 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe PID 1524 wrote to memory of 3200 1524 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe PID 1524 wrote to memory of 3200 1524 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe PID 3200 wrote to memory of 2284 3200 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe explorer.exe PID 3200 wrote to memory of 2284 3200 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe explorer.exe PID 3200 wrote to memory of 2284 3200 743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe explorer.exe PID 2284 wrote to memory of 1272 2284 explorer.exe explorer.exe PID 2284 wrote to memory of 1272 2284 explorer.exe explorer.exe PID 2284 wrote to memory of 1272 2284 explorer.exe explorer.exe PID 2284 wrote to memory of 1272 2284 explorer.exe explorer.exe PID 2284 wrote to memory of 1272 2284 explorer.exe explorer.exe PID 1272 wrote to memory of 4916 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4916 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4916 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 3400 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 3400 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 3400 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4188 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4188 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4188 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4484 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4484 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4484 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 2508 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 2508 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 2508 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4444 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4444 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4444 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 660 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 660 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 660 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 3088 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 3088 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 3088 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 2448 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 2448 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 2448 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 1772 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 1772 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 1772 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 2640 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 2640 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 2640 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4472 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4472 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4472 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4276 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4276 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4276 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4540 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4540 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 4540 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 3992 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 3992 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 3992 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 184 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 184 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 184 1272 explorer.exe spoolsv.exe PID 1272 wrote to memory of 1404 1272 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe"C:\Users\Admin\AppData\Local\Temp\743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:804
-
-
C:\Users\Admin\AppData\Local\Temp\743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe"C:\Users\Admin\AppData\Local\Temp\743972212670f80c4e928fd5f1361664ef179d8d5ea63a84be187e31339666ff.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3200 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4916 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1744 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1896 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1464
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3400 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3896
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4188 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1424 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:824 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2176
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4484 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2508 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4740
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4444 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4516 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3980 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3904
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:660 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3088 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1128 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4908 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:216
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2448 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1772 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4960 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4296 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4048
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2640 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4260
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4472 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1380 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3364 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5016
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4276 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2320
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4540 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1284 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1704 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4480
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3992 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4992
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:184 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4452
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4404
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4572
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1404 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4788
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4416
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4208
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3180 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3796
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2260 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4236
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2064
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3612
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2088 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1112
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4940 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2476
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:448
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4712
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3232 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1632
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4372
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3216
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3704 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3360 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3724
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2588
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4852 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:928
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4192 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4640
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2364
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:768 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:860
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3960 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3968
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1892 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3532
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2552
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2308 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2200
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4600 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5020
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1528
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4128 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5052
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3240
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2712
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4092
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4360
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3720
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3548
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3804
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2304
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4056
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4112
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2328
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1588
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2004
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1712
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3976
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:672
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3356
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4376
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1732
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3160
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2624
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3008
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4212
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2596
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4284
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2360
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:444
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3032
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD59c834dd36fce9c7975dd933405bfa045
SHA1ddbf58cd411d5f93893837c50ff76b4c5a1a5b84
SHA256446003d3d4134e9d5db0855256d44b4eaa64befe2af89b8f7c6484f1a76146b1
SHA5125e21f81d902c0294318787c3faa35752434a731c5170695b22ed17acf0cf9f35fa844fa37bdd79655f3ce869d0c21d9a0f709385f62dd49380bb10b01b63d393
-
Filesize
2.2MB
MD5c9fe426e5f34ed0bdb42be5ebf952ae0
SHA1b924ab08592bd427ab1359a1e4506c8b4604738e
SHA256be42fe14e455b9fd6d40d5ef672ede1db9a6433dc18ad1d22d64ffde9ff9ca4f
SHA5123d195824e01e232bd12d346544ebeccb9e40e4dcb106eeb1ffcb0af91706ee8f675c75f27b3e503cefe6d62fa3423e39bcda1fbe563a1e187de7051c376c5449