Analysis
-
max time kernel
102s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 23:43
Behavioral task
behavioral1
Sample
6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe
Resource
win7-20241023-en
General
-
Target
6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe
-
Size
2.2MB
-
MD5
a1d64fe2f536be7d050ceaacad06aac9
-
SHA1
aea3988cf9de46854d11545b1c005836a43e936f
-
SHA256
6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa
-
SHA512
e5121b9747b85a738089593c3b898c82581e66db3ff2604a2c049bbe84ab58f1c3d3c8b02e20735b09687173a6450765a222968b656b49a67d27306b00a0f8de
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZW:0UzeyQMS4DqodCnoe+iitjWwwi
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe -
Executes dropped EXE 49 IoCs
pid Process 460 explorer.exe 1220 explorer.exe 1928 spoolsv.exe 3344 spoolsv.exe 4892 spoolsv.exe 4020 spoolsv.exe 3168 spoolsv.exe 5020 spoolsv.exe 4504 spoolsv.exe 4716 spoolsv.exe 3124 spoolsv.exe 4104 spoolsv.exe 4452 spoolsv.exe 524 spoolsv.exe 2496 spoolsv.exe 1892 spoolsv.exe 4400 spoolsv.exe 5052 spoolsv.exe 4476 spoolsv.exe 1200 spoolsv.exe 1888 spoolsv.exe 1756 spoolsv.exe 948 spoolsv.exe 3472 explorer.exe 1832 spoolsv.exe 2840 spoolsv.exe 960 spoolsv.exe 3688 explorer.exe 3684 spoolsv.exe 2476 spoolsv.exe 1448 spoolsv.exe 4828 explorer.exe 972 spoolsv.exe 1876 spoolsv.exe 4816 explorer.exe 4008 spoolsv.exe 536 spoolsv.exe 1980 spoolsv.exe 1072 explorer.exe 4136 spoolsv.exe 1388 spoolsv.exe 2164 spoolsv.exe 1172 spoolsv.exe 4924 explorer.exe 4084 spoolsv.exe 3972 spoolsv.exe 2404 explorer.exe 2736 spoolsv.exe 1492 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 4892 set thread context of 1096 4892 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 97 PID 460 set thread context of 1220 460 explorer.exe 102 PID 1928 set thread context of 948 1928 spoolsv.exe 123 PID 3344 set thread context of 960 3344 spoolsv.exe 127 PID 4892 set thread context of 1448 4892 spoolsv.exe 131 PID 4020 set thread context of 1876 4020 spoolsv.exe 134 PID 3168 set thread context of 4008 3168 spoolsv.exe 136 PID 5020 set thread context of 1980 5020 spoolsv.exe 138 PID 4504 set thread context of 1388 4504 spoolsv.exe 141 PID 4716 set thread context of 1172 4716 spoolsv.exe 143 PID 3124 set thread context of 3972 3124 spoolsv.exe 146 PID 4104 set thread context of 1492 4104 spoolsv.exe 149 -
Drops file in Windows directory 41 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1096 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 1096 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 1096 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 1096 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 948 spoolsv.exe 948 spoolsv.exe 960 spoolsv.exe 960 spoolsv.exe 1448 spoolsv.exe 1448 spoolsv.exe 1876 spoolsv.exe 1876 spoolsv.exe 4008 spoolsv.exe 4008 spoolsv.exe 1980 spoolsv.exe 1980 spoolsv.exe 1388 spoolsv.exe 1388 spoolsv.exe 1172 spoolsv.exe 1172 spoolsv.exe 3972 spoolsv.exe 3972 spoolsv.exe 1492 spoolsv.exe 1492 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4892 wrote to memory of 2624 4892 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 83 PID 4892 wrote to memory of 2624 4892 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 83 PID 4892 wrote to memory of 1096 4892 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 97 PID 4892 wrote to memory of 1096 4892 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 97 PID 4892 wrote to memory of 1096 4892 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 97 PID 4892 wrote to memory of 1096 4892 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 97 PID 4892 wrote to memory of 1096 4892 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 97 PID 1096 wrote to memory of 460 1096 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 98 PID 1096 wrote to memory of 460 1096 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 98 PID 1096 wrote to memory of 460 1096 6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe 98 PID 460 wrote to memory of 1220 460 explorer.exe 102 PID 460 wrote to memory of 1220 460 explorer.exe 102 PID 460 wrote to memory of 1220 460 explorer.exe 102 PID 460 wrote to memory of 1220 460 explorer.exe 102 PID 460 wrote to memory of 1220 460 explorer.exe 102 PID 1220 wrote to memory of 1928 1220 explorer.exe 103 PID 1220 wrote to memory of 1928 1220 explorer.exe 103 PID 1220 wrote to memory of 1928 1220 explorer.exe 103 PID 1220 wrote to memory of 3344 1220 explorer.exe 104 PID 1220 wrote to memory of 3344 1220 explorer.exe 104 PID 1220 wrote to memory of 3344 1220 explorer.exe 104 PID 1220 wrote to memory of 4892 1220 explorer.exe 105 PID 1220 wrote to memory of 4892 1220 explorer.exe 105 PID 1220 wrote to memory of 4892 1220 explorer.exe 105 PID 1220 wrote to memory of 4020 1220 explorer.exe 106 PID 1220 wrote to memory of 4020 1220 explorer.exe 106 PID 1220 wrote to memory of 4020 1220 explorer.exe 106 PID 1220 wrote to memory of 3168 1220 explorer.exe 107 PID 1220 wrote to memory of 3168 1220 explorer.exe 107 PID 1220 wrote to memory of 3168 1220 explorer.exe 107 PID 1220 wrote to memory of 5020 1220 explorer.exe 108 PID 1220 wrote to memory of 5020 1220 explorer.exe 108 PID 1220 wrote to memory of 5020 1220 explorer.exe 108 PID 1220 wrote to memory of 4504 1220 explorer.exe 109 PID 1220 wrote to memory of 4504 1220 explorer.exe 109 PID 1220 wrote to memory of 4504 1220 explorer.exe 109 PID 1220 wrote to memory of 4716 1220 explorer.exe 110 PID 1220 wrote to memory of 4716 1220 explorer.exe 110 PID 1220 wrote to memory of 4716 1220 explorer.exe 110 PID 1220 wrote to memory of 3124 1220 explorer.exe 111 PID 1220 wrote to memory of 3124 1220 explorer.exe 111 PID 1220 wrote to memory of 3124 1220 explorer.exe 111 PID 1220 wrote to memory of 4104 1220 explorer.exe 112 PID 1220 wrote to memory of 4104 1220 explorer.exe 112 PID 1220 wrote to memory of 4104 1220 explorer.exe 112 PID 1220 wrote to memory of 4452 1220 explorer.exe 113 PID 1220 wrote to memory of 4452 1220 explorer.exe 113 PID 1220 wrote to memory of 4452 1220 explorer.exe 113 PID 1220 wrote to memory of 524 1220 explorer.exe 114 PID 1220 wrote to memory of 524 1220 explorer.exe 114 PID 1220 wrote to memory of 524 1220 explorer.exe 114 PID 1220 wrote to memory of 2496 1220 explorer.exe 115 PID 1220 wrote to memory of 2496 1220 explorer.exe 115 PID 1220 wrote to memory of 2496 1220 explorer.exe 115 PID 1220 wrote to memory of 1892 1220 explorer.exe 116 PID 1220 wrote to memory of 1892 1220 explorer.exe 116 PID 1220 wrote to memory of 1892 1220 explorer.exe 116 PID 1220 wrote to memory of 4400 1220 explorer.exe 117 PID 1220 wrote to memory of 4400 1220 explorer.exe 117 PID 1220 wrote to memory of 4400 1220 explorer.exe 117 PID 1220 wrote to memory of 5052 1220 explorer.exe 118 PID 1220 wrote to memory of 5052 1220 explorer.exe 118 PID 1220 wrote to memory of 5052 1220 explorer.exe 118 PID 1220 wrote to memory of 4476 1220 explorer.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe"C:\Users\Admin\AppData\Local\Temp\6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe"C:\Users\Admin\AppData\Local\Temp\6a401d33bf750896cb7a733309ce8e360909ef39c94f4a95782f7a6df0ee78fa.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:460 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1928 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:948 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3472 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3128
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3344 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:960 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3688 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4056
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4892 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1448 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4828 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2412
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4020 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1876 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4816 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4416
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3168 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4008
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5020 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1980 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1072 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1520
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4504 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1388
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4716 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1172 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4924 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4472
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3124 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3972 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2404 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4632
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4104 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4452 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3900
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4004
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4492
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:524 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3184
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2496 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2756
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1496
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3976
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1892 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1724
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4400 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3260
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2956
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1920
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5052 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:544
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4476 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4444
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4868
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:888
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1200 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3564
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1888 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:860
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1704
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4080
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1756 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1240
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1832 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4640
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2840 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3132
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3684 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2816
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2476 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3988
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:972 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3164
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4040
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:536 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4136 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:824
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1436
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2164 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3092
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2736 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4044
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:872
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1384
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4312
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1568
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3728
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:976
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4544
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2400
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4320
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3872
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1904
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3512
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2388
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3208
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4928
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:368
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4144
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4032
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1476
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4428
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2072
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3660
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3316
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2640
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4844
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4808
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4488
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4824
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1932
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4564
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2236
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2816
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3648
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3852
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4328
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1272
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD53bf7cd889c33b531283d85bc08155f6e
SHA1eadaff1de1ca3fcfeef12b85ae67cafdba14ddda
SHA2561a034e8191b27fe367aa48f5a0a31bf7d0a7000196d4385f61a3f09b5df0371f
SHA512c0e3397dd9724d06097d2fe428e9ef4dd3918d8957561f34c590fa2d7850e803d5cf4b7688c27a3ab189ab4fc16e40762e50d2d96512e62c018d8d86b221c3f6
-
Filesize
2.2MB
MD5f4ea43508412ace1e878868ae66ef8d0
SHA1947ef3e471eeb7dd0f798f243e61c61acc42d507
SHA256cc400219c445660a92fdcfe7d06fb0855937959535822a6db469c0637d7f3840
SHA5121d212ee1886f898b85637dd14d3fd2dbdcbb454cd5b58d5064071b9a127daf4dd4008725d1dfb8ae2d5c80c0ae170cb2c44736d58e8391f9fb6fb3fd138f20f3