Analysis
-
max time kernel
99s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 20:21
Behavioral task
behavioral1
Sample
201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe
Resource
win7-20240903-en
General
-
Target
201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe
-
Size
2.2MB
-
MD5
a6875a9d1a334d2d5109a0b7fc3d081d
-
SHA1
16772a8391f3b58ee2a9ccf3066941675fbeab22
-
SHA256
201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f
-
SHA512
52d4ef6c01830f23d86626e890be2b7298f18472d979ae3b77e62931398182c8c42014aea804f5fbf55a707506f92a5b944c552e43f2af0dd35729a41fdc5438
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZc:0UzeyQMS4DqodCnoe+iitjWwwo
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe -
Executes dropped EXE 44 IoCs
pid Process 772 explorer.exe 1012 explorer.exe 1068 spoolsv.exe 2584 spoolsv.exe 4972 spoolsv.exe 4840 spoolsv.exe 3564 spoolsv.exe 1504 spoolsv.exe 3692 spoolsv.exe 1028 spoolsv.exe 1212 spoolsv.exe 3040 spoolsv.exe 4292 spoolsv.exe 3676 spoolsv.exe 1828 spoolsv.exe 3776 spoolsv.exe 4304 spoolsv.exe 1956 spoolsv.exe 1920 spoolsv.exe 1604 spoolsv.exe 2452 spoolsv.exe 3028 spoolsv.exe 3752 spoolsv.exe 4172 spoolsv.exe 2612 spoolsv.exe 3668 spoolsv.exe 4408 explorer.exe 2252 spoolsv.exe 2456 spoolsv.exe 1480 spoolsv.exe 1876 explorer.exe 3664 spoolsv.exe 3232 spoolsv.exe 2072 spoolsv.exe 3604 explorer.exe 436 spoolsv.exe 2320 spoolsv.exe 1436 spoolsv.exe 1316 explorer.exe 460 spoolsv.exe 3052 spoolsv.exe 1216 spoolsv.exe 1088 explorer.exe 3728 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 1408 set thread context of 4592 1408 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 97 PID 772 set thread context of 1012 772 explorer.exe 102 PID 1068 set thread context of 3668 1068 spoolsv.exe 126 PID 2584 set thread context of 2252 2584 spoolsv.exe 128 PID 4972 set thread context of 1480 4972 spoolsv.exe 130 PID 4840 set thread context of 3664 4840 spoolsv.exe 132 PID 3564 set thread context of 2072 3564 spoolsv.exe 134 PID 1504 set thread context of 436 1504 spoolsv.exe 136 PID 3692 set thread context of 1436 3692 spoolsv.exe 138 PID 1028 set thread context of 3052 1028 spoolsv.exe 141 PID 1212 set thread context of 1216 1212 spoolsv.exe 142 -
Drops file in Windows directory 36 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 4592 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 4592 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 4592 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 4592 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 1012 explorer.exe 3668 spoolsv.exe 3668 spoolsv.exe 2252 spoolsv.exe 2252 spoolsv.exe 1480 spoolsv.exe 1480 spoolsv.exe 3664 spoolsv.exe 3664 spoolsv.exe 2072 spoolsv.exe 2072 spoolsv.exe 436 spoolsv.exe 436 spoolsv.exe 1436 spoolsv.exe 1436 spoolsv.exe 3052 spoolsv.exe 3052 spoolsv.exe 1216 spoolsv.exe 1216 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1408 wrote to memory of 2420 1408 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 83 PID 1408 wrote to memory of 2420 1408 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 83 PID 1408 wrote to memory of 4592 1408 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 97 PID 1408 wrote to memory of 4592 1408 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 97 PID 1408 wrote to memory of 4592 1408 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 97 PID 1408 wrote to memory of 4592 1408 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 97 PID 1408 wrote to memory of 4592 1408 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 97 PID 4592 wrote to memory of 772 4592 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 99 PID 4592 wrote to memory of 772 4592 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 99 PID 4592 wrote to memory of 772 4592 201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe 99 PID 772 wrote to memory of 1012 772 explorer.exe 102 PID 772 wrote to memory of 1012 772 explorer.exe 102 PID 772 wrote to memory of 1012 772 explorer.exe 102 PID 772 wrote to memory of 1012 772 explorer.exe 102 PID 772 wrote to memory of 1012 772 explorer.exe 102 PID 1012 wrote to memory of 1068 1012 explorer.exe 103 PID 1012 wrote to memory of 1068 1012 explorer.exe 103 PID 1012 wrote to memory of 1068 1012 explorer.exe 103 PID 1012 wrote to memory of 2584 1012 explorer.exe 104 PID 1012 wrote to memory of 2584 1012 explorer.exe 104 PID 1012 wrote to memory of 2584 1012 explorer.exe 104 PID 1012 wrote to memory of 4972 1012 explorer.exe 105 PID 1012 wrote to memory of 4972 1012 explorer.exe 105 PID 1012 wrote to memory of 4972 1012 explorer.exe 105 PID 1012 wrote to memory of 4840 1012 explorer.exe 106 PID 1012 wrote to memory of 4840 1012 explorer.exe 106 PID 1012 wrote to memory of 4840 1012 explorer.exe 106 PID 1012 wrote to memory of 3564 1012 explorer.exe 107 PID 1012 wrote to memory of 3564 1012 explorer.exe 107 PID 1012 wrote to memory of 3564 1012 explorer.exe 107 PID 1012 wrote to memory of 1504 1012 explorer.exe 108 PID 1012 wrote to memory of 1504 1012 explorer.exe 108 PID 1012 wrote to memory of 1504 1012 explorer.exe 108 PID 1012 wrote to memory of 3692 1012 explorer.exe 109 PID 1012 wrote to memory of 3692 1012 explorer.exe 109 PID 1012 wrote to memory of 3692 1012 explorer.exe 109 PID 1012 wrote to memory of 1028 1012 explorer.exe 110 PID 1012 wrote to memory of 1028 1012 explorer.exe 110 PID 1012 wrote to memory of 1028 1012 explorer.exe 110 PID 1012 wrote to memory of 1212 1012 explorer.exe 111 PID 1012 wrote to memory of 1212 1012 explorer.exe 111 PID 1012 wrote to memory of 1212 1012 explorer.exe 111 PID 1012 wrote to memory of 3040 1012 explorer.exe 112 PID 1012 wrote to memory of 3040 1012 explorer.exe 112 PID 1012 wrote to memory of 3040 1012 explorer.exe 112 PID 1012 wrote to memory of 4292 1012 explorer.exe 113 PID 1012 wrote to memory of 4292 1012 explorer.exe 113 PID 1012 wrote to memory of 4292 1012 explorer.exe 113 PID 1012 wrote to memory of 3676 1012 explorer.exe 114 PID 1012 wrote to memory of 3676 1012 explorer.exe 114 PID 1012 wrote to memory of 3676 1012 explorer.exe 114 PID 1012 wrote to memory of 1828 1012 explorer.exe 115 PID 1012 wrote to memory of 1828 1012 explorer.exe 115 PID 1012 wrote to memory of 1828 1012 explorer.exe 115 PID 1012 wrote to memory of 3776 1012 explorer.exe 116 PID 1012 wrote to memory of 3776 1012 explorer.exe 116 PID 1012 wrote to memory of 3776 1012 explorer.exe 116 PID 1012 wrote to memory of 4304 1012 explorer.exe 117 PID 1012 wrote to memory of 4304 1012 explorer.exe 117 PID 1012 wrote to memory of 4304 1012 explorer.exe 117 PID 1012 wrote to memory of 1956 1012 explorer.exe 118 PID 1012 wrote to memory of 1956 1012 explorer.exe 118 PID 1012 wrote to memory of 1956 1012 explorer.exe 118 PID 1012 wrote to memory of 1920 1012 explorer.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe"C:\Users\Admin\AppData\Local\Temp\201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe"C:\Users\Admin\AppData\Local\Temp\201f1bc0a940a106a89730b4066a3445eba71d7dbe693f19e499236db3a9862f.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4592 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1012 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1068 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3668 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4408 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1320
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2584 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2252
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4972 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1480 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1876 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4052
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4840 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3664
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3564 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2072 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3604 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3512
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1504 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:436
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3692 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1436 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1316 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5040
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1028 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3052
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1212 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1216 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1088 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1952
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3040 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2076
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4292 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2248
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4812
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1516
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3676 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1864
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1828 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4116
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4296
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2680
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3776 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4268
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4304 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1668
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1624
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3428
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1956 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4928
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1444
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:184
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1920 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4700
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1604 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1500
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3576
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:708
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2452 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1252
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3028 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3688
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4764
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4496
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1184
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4172 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4904
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2160
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1468
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2612 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2412
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1544
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4120
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2456 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3372
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4888
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2264
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3232 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1980
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2320 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4368
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4256
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:460 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4748
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3728 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4476
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:948
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4392
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2128
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5104
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3680
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4844
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4992
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1808
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2408
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3448
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4696
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4280
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3832
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3588
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2708
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4660
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:904
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4092
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5100
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2068
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2164
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2900
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1472
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1008
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1324
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1936
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4804
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2976
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3380
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4960
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4492
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5052
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2484
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1736
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4892
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3516
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1424
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:880
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1524
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:836
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2480
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1488
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2284
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2600
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2660
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4332
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1644
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD526186ee81b0a83d3dfdd2ddf0d718b2f
SHA178c665a4d4b8efd2091370b85b39d260ecd256f7
SHA256d1e23fd2f5841a7142a3100d3362cd4ea316a59173fa9ce7678558c4db77fe25
SHA51256ba9ce57fe569222883c2a98299bf9924d20dbe82c4dd1d1b970a8165c923f06709de499e29eb09360a3fabc13b7edeaf2cb72c8527cd8c208c6b7e66644d30
-
Filesize
2.2MB
MD5fb76f2834f0bcad72ba0daa4add9fe22
SHA12b20491a952fefede3fc9c5b04cc0f1755772742
SHA2566e105b4c6aa5f1303e086d23977272a846ebace877b712be840762c4674df8d1
SHA512d5854d94749c7d368f06fa6c825e8ea8934fce73a7d05b9b8327156609f4eddea565b2199684c66dd119604cdc8a06026bcfc9710afd107f3ad309e7d6eb9886