Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 04:40
Behavioral task
behavioral1
Sample
dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe
Resource
win7-20241010-en
General
-
Target
dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe
-
Size
2.2MB
-
MD5
e849d8f8696975793418829523c81600
-
SHA1
3d9f4b3041e56ec43b3f30e35ab8dbce2704e14b
-
SHA256
dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0ea
-
SHA512
fe4601dac45f7c43f9692e4a547d3da6747711cebdadd1723d0dc5cd5f1ba6b412ea72153d1e7f923ea429fcad7b51d7fb6c39d028f52af8b125a8ac6ff7a9aa
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZh:0UzeyQMS4DqodCnoe+iitjWwwl
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe -
Executes dropped EXE 50 IoCs
pid Process 316 explorer.exe 1684 explorer.exe 908 spoolsv.exe 524 spoolsv.exe 2532 spoolsv.exe 2044 spoolsv.exe 1808 spoolsv.exe 2908 spoolsv.exe 2104 spoolsv.exe 316 spoolsv.exe 1084 spoolsv.exe 1280 spoolsv.exe 2552 spoolsv.exe 1752 spoolsv.exe 2792 spoolsv.exe 1668 spoolsv.exe 896 spoolsv.exe 2988 spoolsv.exe 2540 spoolsv.exe 2448 spoolsv.exe 2592 spoolsv.exe 2680 spoolsv.exe 2072 spoolsv.exe 1484 spoolsv.exe 2460 spoolsv.exe 1976 spoolsv.exe 1072 spoolsv.exe 1532 spoolsv.exe 2852 spoolsv.exe 648 spoolsv.exe 2632 spoolsv.exe 1232 spoolsv.exe 2784 spoolsv.exe 1880 spoolsv.exe 2136 spoolsv.exe 804 spoolsv.exe 2880 spoolsv.exe 2760 spoolsv.exe 2996 spoolsv.exe 1980 spoolsv.exe 560 spoolsv.exe 1860 spoolsv.exe 3068 spoolsv.exe 1856 spoolsv.exe 2752 spoolsv.exe 1184 spoolsv.exe 2464 spoolsv.exe 1956 spoolsv.exe 1536 spoolsv.exe 3020 spoolsv.exe -
Loads dropped DLL 64 IoCs
pid Process 2688 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 2688 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2808 set thread context of 2688 2808 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 31 PID 316 set thread context of 1684 316 explorer.exe 33 -
Drops file in Windows directory 52 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 52 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 2688 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 2688 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2864 2808 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 30 PID 2808 wrote to memory of 2864 2808 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 30 PID 2808 wrote to memory of 2864 2808 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 30 PID 2808 wrote to memory of 2864 2808 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 30 PID 2808 wrote to memory of 2688 2808 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 31 PID 2808 wrote to memory of 2688 2808 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 31 PID 2808 wrote to memory of 2688 2808 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 31 PID 2808 wrote to memory of 2688 2808 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 31 PID 2808 wrote to memory of 2688 2808 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 31 PID 2808 wrote to memory of 2688 2808 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 31 PID 2688 wrote to memory of 316 2688 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 32 PID 2688 wrote to memory of 316 2688 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 32 PID 2688 wrote to memory of 316 2688 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 32 PID 2688 wrote to memory of 316 2688 dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe 32 PID 316 wrote to memory of 1684 316 explorer.exe 33 PID 316 wrote to memory of 1684 316 explorer.exe 33 PID 316 wrote to memory of 1684 316 explorer.exe 33 PID 316 wrote to memory of 1684 316 explorer.exe 33 PID 316 wrote to memory of 1684 316 explorer.exe 33 PID 316 wrote to memory of 1684 316 explorer.exe 33 PID 1684 wrote to memory of 908 1684 explorer.exe 34 PID 1684 wrote to memory of 908 1684 explorer.exe 34 PID 1684 wrote to memory of 908 1684 explorer.exe 34 PID 1684 wrote to memory of 908 1684 explorer.exe 34 PID 1684 wrote to memory of 524 1684 explorer.exe 35 PID 1684 wrote to memory of 524 1684 explorer.exe 35 PID 1684 wrote to memory of 524 1684 explorer.exe 35 PID 1684 wrote to memory of 524 1684 explorer.exe 35 PID 1684 wrote to memory of 2532 1684 explorer.exe 36 PID 1684 wrote to memory of 2532 1684 explorer.exe 36 PID 1684 wrote to memory of 2532 1684 explorer.exe 36 PID 1684 wrote to memory of 2532 1684 explorer.exe 36 PID 1684 wrote to memory of 2044 1684 explorer.exe 37 PID 1684 wrote to memory of 2044 1684 explorer.exe 37 PID 1684 wrote to memory of 2044 1684 explorer.exe 37 PID 1684 wrote to memory of 2044 1684 explorer.exe 37 PID 1684 wrote to memory of 1808 1684 explorer.exe 38 PID 1684 wrote to memory of 1808 1684 explorer.exe 38 PID 1684 wrote to memory of 1808 1684 explorer.exe 38 PID 1684 wrote to memory of 1808 1684 explorer.exe 38 PID 1684 wrote to memory of 2908 1684 explorer.exe 39 PID 1684 wrote to memory of 2908 1684 explorer.exe 39 PID 1684 wrote to memory of 2908 1684 explorer.exe 39 PID 1684 wrote to memory of 2908 1684 explorer.exe 39 PID 1684 wrote to memory of 2104 1684 explorer.exe 40 PID 1684 wrote to memory of 2104 1684 explorer.exe 40 PID 1684 wrote to memory of 2104 1684 explorer.exe 40 PID 1684 wrote to memory of 2104 1684 explorer.exe 40 PID 1684 wrote to memory of 316 1684 explorer.exe 41 PID 1684 wrote to memory of 316 1684 explorer.exe 41 PID 1684 wrote to memory of 316 1684 explorer.exe 41 PID 1684 wrote to memory of 316 1684 explorer.exe 41 PID 1684 wrote to memory of 1084 1684 explorer.exe 42 PID 1684 wrote to memory of 1084 1684 explorer.exe 42 PID 1684 wrote to memory of 1084 1684 explorer.exe 42 PID 1684 wrote to memory of 1084 1684 explorer.exe 42 PID 1684 wrote to memory of 1280 1684 explorer.exe 43 PID 1684 wrote to memory of 1280 1684 explorer.exe 43 PID 1684 wrote to memory of 1280 1684 explorer.exe 43 PID 1684 wrote to memory of 1280 1684 explorer.exe 43 PID 1684 wrote to memory of 2552 1684 explorer.exe 44 PID 1684 wrote to memory of 2552 1684 explorer.exe 44 PID 1684 wrote to memory of 2552 1684 explorer.exe 44 PID 1684 wrote to memory of 2552 1684 explorer.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe"C:\Users\Admin\AppData\Local\Temp\dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe"C:\Users\Admin\AppData\Local\Temp\dbbb298d419870430ebfdde1eb51ea75e2bd71228acf75a7485b62be2c1eb0eaN.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:908 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1056
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2712
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:524 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2724
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2532 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1036
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2044 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1656
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1808 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:568
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2908 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1396
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2104 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:264
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:316 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2436
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3268
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1280
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2552
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3500
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2792
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1668
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:896
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2988
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2540
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2448
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2592
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2680
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2072
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1484
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2460
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1976
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1072
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1532
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2852
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:648
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2632
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1232
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2784
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1880
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2136
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:804
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2880
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2760
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2996
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1980
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:560
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1860
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3068
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1856
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2752
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1184
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2464
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1956
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1536
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3020
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2208
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2676
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3084
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5c7f242987288d2766ddfac48f8652563
SHA1866767d261ad648884087cc61140e2b63c406cea
SHA25603b342d7aee9092c1578fd0cd6742b2d58f3020be237119fbe0ebf45a0719a14
SHA5128fb615fd3e6f46e30cc2bb784c8fc1af0b9289431f9ab8b9d0b80ad52d6159db42cfa7c1fdc2c10a896295869d0979ba72219a2ee80fdacb253a0157c313be86
-
Filesize
2.2MB
MD5057bed31d21c95366e0893e635778825
SHA10d1ce8657c4a774a96285e934f9d448c7004103e
SHA256ca9e7cbdb7dd2659c2b9320e8f99ec298fb930f8de2bd6fc58642fa5f24189a4
SHA512b19a5f2895656b414c50905fadb7436d3b0b2dda4733f1247632ecf7e70852d93548c49ac65b9d4aefa87a3de7de2e273821c161c24a7e621f455619b1104d91