Analysis

  • max time kernel
    115s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2024 19:44

General

  • Target

    083c1cd584a8dbc8ef9967057466720a37dbfa760862bb632bed78b69a46e7d4N.exe

  • Size

    2.2MB

  • MD5

    8360872679c0ab0475782e6d584032b0

  • SHA1

    3207b9c4f500dc18aec98402435fbd180b1333fe

  • SHA256

    083c1cd584a8dbc8ef9967057466720a37dbfa760862bb632bed78b69a46e7d4

  • SHA512

    37adb76d6f380498aa4e9f323dc64dd5255f899c1c4f3789f820870fc3a29995da14c5ac3d12b42df952ba45ce7096c96e0d88af2bea9d74b7ba2a6794ae0cb5

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZS:0UzeyQMS4DqodCnoe+iitjWwwW

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 30 IoCs
  • Drops file in Windows directory 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 60 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\083c1cd584a8dbc8ef9967057466720a37dbfa760862bb632bed78b69a46e7d4N.exe
    "C:\Users\Admin\AppData\Local\Temp\083c1cd584a8dbc8ef9967057466720a37dbfa760862bb632bed78b69a46e7d4N.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4776
      • C:\Users\Admin\AppData\Local\Temp\083c1cd584a8dbc8ef9967057466720a37dbfa760862bb632bed78b69a46e7d4N.exe
        "C:\Users\Admin\AppData\Local\Temp\083c1cd584a8dbc8ef9967057466720a37dbfa760862bb632bed78b69a46e7d4N.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1548
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:1484
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1696
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4416
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4476
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:2628
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                      PID:1036
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:3588
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:244
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2460
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:5092
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:1828
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2812
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:3308
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                        PID:3424
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4556
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:1620
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:652
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:3628
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:2732
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:3724
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:4864
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1320
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:2224
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1704
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:1728
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:1832
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:2404
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:1500
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:2244
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1008
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:3120
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:1676
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:3360
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:3260
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4812
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:4524
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:3392
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1488
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:1224
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:4388
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:4336
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4936
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:3396
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:2260
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:5032
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:4232
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:2084
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:3168
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1944
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:2148
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4572
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:3992
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1812
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:4804
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:1080
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:5088
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:5000
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1848
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:1172
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:2728
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:1928
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:4664
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4440
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:1056
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4896
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:4928
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4364
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:1540
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • System Location Discovery: System Language Discovery
                      PID:2568
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:2200
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                      PID:3172
                      • \??\c:\windows\system\explorer.exe
                        c:\windows\system\explorer.exe
                        7⤵
                          PID:2076
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:3280
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:2620
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:3004
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:5108
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:2224
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Drops file in Windows directory
                      PID:4904
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Drops file in Windows directory
                      PID:3604
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:5096
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                        PID:2584
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                          PID:716
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                            PID:4780
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                    1⤵
                      PID:804

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Windows\Parameters.ini

                      Filesize

                      74B

                      MD5

                      6687785d6a31cdf9a5f80acb3abc459b

                      SHA1

                      1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

                      SHA256

                      3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

                      SHA512

                      5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

                    • C:\Windows\System\explorer.exe

                      Filesize

                      2.2MB

                      MD5

                      31d6e6be87297d4d99d2527af481def0

                      SHA1

                      a262c49996a19c5298f85ef1524ece63aec13ec2

                      SHA256

                      ff6b14c111938f64ee3bcb9437da8ebe4a7987d9f0d83fa75c1fea2efa256b00

                      SHA512

                      81bb45faf16ec2a6dabe807568d9565eef365c59ec18f62932fe7f25e394aa01f52ec95b6d5c54fafaec243ef63f0bc6b0c2fe5bf2b494b5b140f3c7b3a12fd1

                    • C:\Windows\System\spoolsv.exe

                      Filesize

                      2.2MB

                      MD5

                      d43122aac176dd4061b3e27372bb1a2e

                      SHA1

                      6b54d1ffebebc0f2882ac4e8c40aebf65be396dd

                      SHA256

                      e8be70f8448e5ac52631ce43da5f3678ab6396aeed893ec7a5f105c7a921b4f5

                      SHA512

                      266cdbd4b3524cb2514d8c5d0e05890bc407724f5b9fedf25b9dbee2290989dd753d8c1eda34873f4e5781f8edd5eca85f30f80d8ac94ee6df525a46437b344f

                    • memory/244-1832-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/244-1847-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/652-1056-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/1008-2322-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1036-3290-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1056-2913-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1172-2830-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1172-2826-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1224-2472-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1320-1178-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/1484-86-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/1484-80-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/1488-1621-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/1540-3270-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1548-69-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1548-67-0x0000000000440000-0x0000000000509000-memory.dmp

                      Filesize

                      804KB

                    • memory/1548-40-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1548-39-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1620-1997-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1676-2332-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1696-589-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1696-85-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1704-1240-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/1728-2153-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1828-939-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/1832-1297-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/1928-3047-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1928-2906-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/1944-1889-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/2084-1827-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/2148-2649-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/2148-2651-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/2224-2139-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/2244-1363-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/2260-1822-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/2404-2313-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/2404-2446-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/2460-868-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/2460-1898-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/2732-1112-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/2812-2116-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/2812-1986-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/3120-1430-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/3168-2640-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/3172-3349-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/3360-1477-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/3396-0-0x0000000002480000-0x0000000002481000-memory.dmp

                      Filesize

                      4KB

                    • memory/3396-44-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/3396-36-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/3396-37-0x0000000002480000-0x0000000002481000-memory.dmp

                      Filesize

                      4KB

                    • memory/3424-3359-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/3588-787-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/3588-1834-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/3628-2009-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/3724-2221-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/3724-2129-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/3992-2725-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/3992-2730-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4336-2483-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4388-1688-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4416-1824-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4416-640-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4476-1968-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4476-1823-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4524-2617-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4524-2462-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4556-1005-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4572-1890-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4804-2809-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4804-2883-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4812-1580-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4928-2925-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4936-1800-0x0000000000400000-0x00000000005D3000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/5000-2817-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/5032-2631-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/5032-2792-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/5092-1896-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB

                    • memory/5092-1900-0x0000000000400000-0x000000000043E000-memory.dmp

                      Filesize

                      248KB