Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 06:08
Behavioral task
behavioral1
Sample
JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe
-
Size
2.9MB
-
MD5
fc390106d866a31e3f0fc8993fcc3406
-
SHA1
e8c00c71f362d578174b00880a16144be3f4a143
-
SHA256
a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78
-
SHA512
4193aa3b265a7ad833db48a3b8c51402311888a8b88d87cd9582e45742c4d79260a53963077fd85383a2a4a536a1f658b3d9d89bc1afbf3a3939f7ecba5582f7
-
SSDEEP
24576:1ow7A3mZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH/:1ow7A3mw4gxeOw46fUbNecCCFbNecu
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000016d6b-87.dat warzonerat behavioral1/files/0x0007000000016d54-165.dat warzonerat behavioral1/files/0x0009000000016d67-181.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 28 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 1104 explorer.exe 1952 explorer.exe 1880 explorer.exe 1312 spoolsv.exe 2352 spoolsv.exe 1596 spoolsv.exe 2508 spoolsv.exe 2080 spoolsv.exe 2972 spoolsv.exe 1444 spoolsv.exe 1256 spoolsv.exe 2804 spoolsv.exe 3040 spoolsv.exe 2844 spoolsv.exe 932 spoolsv.exe 864 spoolsv.exe 1992 spoolsv.exe 344 spoolsv.exe 2852 spoolsv.exe 1264 spoolsv.exe 324 spoolsv.exe 2784 spoolsv.exe 796 spoolsv.exe 2592 spoolsv.exe 1140 spoolsv.exe 2116 spoolsv.exe 2076 spoolsv.exe 2456 spoolsv.exe 2280 spoolsv.exe 904 spoolsv.exe 2444 spoolsv.exe 2840 spoolsv.exe 2764 spoolsv.exe 3028 spoolsv.exe 688 spoolsv.exe 3044 spoolsv.exe 304 spoolsv.exe 1840 spoolsv.exe 2328 spoolsv.exe 1888 spoolsv.exe 1080 spoolsv.exe 1980 spoolsv.exe 2264 spoolsv.exe 2936 spoolsv.exe 2840 spoolsv.exe 2340 spoolsv.exe 1084 spoolsv.exe 3044 spoolsv.exe 2732 spoolsv.exe 1940 spoolsv.exe 1376 spoolsv.exe 1888 spoolsv.exe 1668 spoolsv.exe 2252 spoolsv.exe 2896 spoolsv.exe 2728 spoolsv.exe 2984 spoolsv.exe 600 spoolsv.exe 2036 spoolsv.exe 636 explorer.exe 2748 spoolsv.exe 920 explorer.exe 2900 spoolsv.exe 1636 spoolsv.exe -
Loads dropped DLL 64 IoCs
pid Process 2096 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 2096 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 1880 explorer.exe 1880 explorer.exe 1312 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 1596 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 2080 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 1444 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 2804 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 2844 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 864 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 344 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 1264 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 2784 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 2592 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 2116 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 2456 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 904 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 2840 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 3028 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 3044 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 1840 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 1888 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 1980 spoolsv.exe 1880 explorer.exe 1880 explorer.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe -
Suspicious use of SetThreadContext 60 IoCs
description pid Process procid_target PID 2616 set thread context of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2420 set thread context of 2096 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 34 PID 2420 set thread context of 1492 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 35 PID 1104 set thread context of 1952 1104 explorer.exe 39 PID 1952 set thread context of 1880 1952 explorer.exe 40 PID 1952 set thread context of 992 1952 explorer.exe 41 PID 1312 set thread context of 2352 1312 spoolsv.exe 45 PID 1596 set thread context of 2508 1596 spoolsv.exe 48 PID 2080 set thread context of 2972 2080 spoolsv.exe 52 PID 1444 set thread context of 1256 1444 spoolsv.exe 56 PID 2804 set thread context of 3040 2804 spoolsv.exe 60 PID 2844 set thread context of 932 2844 spoolsv.exe 64 PID 864 set thread context of 1992 864 spoolsv.exe 67 PID 344 set thread context of 2852 344 spoolsv.exe 71 PID 1264 set thread context of 324 1264 spoolsv.exe 74 PID 2784 set thread context of 796 2784 spoolsv.exe 78 PID 2592 set thread context of 1140 2592 spoolsv.exe 82 PID 2116 set thread context of 2076 2116 spoolsv.exe 86 PID 2456 set thread context of 2280 2456 spoolsv.exe 90 PID 904 set thread context of 2444 904 spoolsv.exe 94 PID 2840 set thread context of 2764 2840 spoolsv.exe 98 PID 3028 set thread context of 688 3028 spoolsv.exe 102 PID 3044 set thread context of 304 3044 spoolsv.exe 106 PID 1840 set thread context of 2328 1840 spoolsv.exe 110 PID 1888 set thread context of 1080 1888 spoolsv.exe 114 PID 1980 set thread context of 2264 1980 spoolsv.exe 118 PID 2936 set thread context of 2840 2936 spoolsv.exe 122 PID 2340 set thread context of 1084 2340 spoolsv.exe 126 PID 3044 set thread context of 2732 3044 spoolsv.exe 130 PID 1940 set thread context of 1376 1940 spoolsv.exe 134 PID 1888 set thread context of 1668 1888 spoolsv.exe 138 PID 2252 set thread context of 2896 2252 spoolsv.exe 142 PID 2728 set thread context of 2984 2728 spoolsv.exe 146 PID 2352 set thread context of 2036 2352 spoolsv.exe 149 PID 2352 set thread context of 2372 2352 spoolsv.exe 150 PID 600 set thread context of 2748 600 spoolsv.exe 155 PID 636 set thread context of 920 636 explorer.exe 156 PID 2508 set thread context of 1636 2508 spoolsv.exe 159 PID 2508 set thread context of 344 2508 spoolsv.exe 161 PID 2972 set thread context of 2416 2972 spoolsv.exe 165 PID 2972 set thread context of 2856 2972 spoolsv.exe 166 PID 2900 set thread context of 2596 2900 spoolsv.exe 167 PID 1888 set thread context of 2920 1888 explorer.exe 168 PID 1256 set thread context of 1276 1256 spoolsv.exe 171 PID 1256 set thread context of 1592 1256 spoolsv.exe 172 PID 320 set thread context of 556 320 spoolsv.exe 177 PID 2224 set thread context of 2344 2224 explorer.exe 178 PID 3040 set thread context of 3004 3040 spoolsv.exe 181 PID 3040 set thread context of 1744 3040 spoolsv.exe 182 PID 2196 set thread context of 1948 2196 spoolsv.exe 187 PID 2304 set thread context of 2976 2304 explorer.exe 188 PID 932 set thread context of 2912 932 spoolsv.exe 191 PID 932 set thread context of 784 932 spoolsv.exe 192 PID 1648 set thread context of 316 1648 spoolsv.exe 197 PID 708 set thread context of 1824 708 explorer.exe 200 PID 1992 set thread context of 1576 1992 spoolsv.exe 202 PID 1992 set thread context of 1796 1992 spoolsv.exe 204 PID 828 set thread context of 1388 828 spoolsv.exe 203 PID 2852 set thread context of 2640 2852 spoolsv.exe 208 PID 2852 set thread context of 2944 2852 spoolsv.exe 209 -
Drops file in Windows directory 44 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 2096 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 1104 explorer.exe 1312 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 1596 spoolsv.exe 1880 explorer.exe 2080 spoolsv.exe 1880 explorer.exe 1444 spoolsv.exe 1880 explorer.exe 2804 spoolsv.exe 1880 explorer.exe 2844 spoolsv.exe 1880 explorer.exe 864 spoolsv.exe 1880 explorer.exe 344 spoolsv.exe 1880 explorer.exe 1264 spoolsv.exe 1880 explorer.exe 2784 spoolsv.exe 1880 explorer.exe 2592 spoolsv.exe 1880 explorer.exe 2116 spoolsv.exe 1880 explorer.exe 2456 spoolsv.exe 1880 explorer.exe 904 spoolsv.exe 1880 explorer.exe 2840 spoolsv.exe 1880 explorer.exe 3028 spoolsv.exe 1880 explorer.exe 3044 spoolsv.exe 1880 explorer.exe 1840 spoolsv.exe 1880 explorer.exe 1888 spoolsv.exe 1880 explorer.exe 1980 spoolsv.exe 1880 explorer.exe 2936 spoolsv.exe 1880 explorer.exe 2340 spoolsv.exe 1880 explorer.exe 3044 spoolsv.exe 1880 explorer.exe 1940 spoolsv.exe 1880 explorer.exe 1888 spoolsv.exe 1880 explorer.exe 2252 spoolsv.exe 1880 explorer.exe 2728 spoolsv.exe 1880 explorer.exe 600 spoolsv.exe 636 explorer.exe 1880 explorer.exe 2900 spoolsv.exe 1888 explorer.exe 1880 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 2096 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 2096 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 1104 explorer.exe 1104 explorer.exe 1880 explorer.exe 1880 explorer.exe 1312 spoolsv.exe 1312 spoolsv.exe 1880 explorer.exe 1880 explorer.exe 1596 spoolsv.exe 1596 spoolsv.exe 2080 spoolsv.exe 2080 spoolsv.exe 1444 spoolsv.exe 1444 spoolsv.exe 2804 spoolsv.exe 2804 spoolsv.exe 2844 spoolsv.exe 2844 spoolsv.exe 864 spoolsv.exe 864 spoolsv.exe 344 spoolsv.exe 344 spoolsv.exe 1264 spoolsv.exe 1264 spoolsv.exe 2784 spoolsv.exe 2784 spoolsv.exe 2592 spoolsv.exe 2592 spoolsv.exe 2116 spoolsv.exe 2116 spoolsv.exe 2456 spoolsv.exe 2456 spoolsv.exe 904 spoolsv.exe 904 spoolsv.exe 2840 spoolsv.exe 2840 spoolsv.exe 3028 spoolsv.exe 3028 spoolsv.exe 3044 spoolsv.exe 3044 spoolsv.exe 1840 spoolsv.exe 1840 spoolsv.exe 1888 spoolsv.exe 1888 spoolsv.exe 1980 spoolsv.exe 1980 spoolsv.exe 2936 spoolsv.exe 2936 spoolsv.exe 2340 spoolsv.exe 2340 spoolsv.exe 3044 spoolsv.exe 3044 spoolsv.exe 1940 spoolsv.exe 1940 spoolsv.exe 1888 spoolsv.exe 1888 spoolsv.exe 2252 spoolsv.exe 2252 spoolsv.exe 2728 spoolsv.exe 2728 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1832 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 30 PID 2616 wrote to memory of 1832 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 30 PID 2616 wrote to memory of 1832 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 30 PID 2616 wrote to memory of 1832 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 30 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2616 wrote to memory of 2420 2616 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 32 PID 2420 wrote to memory of 2096 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 34 PID 2420 wrote to memory of 2096 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 34 PID 2420 wrote to memory of 2096 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 34 PID 2420 wrote to memory of 2096 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 34 PID 2420 wrote to memory of 2096 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 34 PID 2420 wrote to memory of 2096 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 34 PID 2420 wrote to memory of 2096 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 34 PID 2420 wrote to memory of 2096 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 34 PID 2420 wrote to memory of 2096 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 34 PID 2420 wrote to memory of 1492 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 35 PID 2420 wrote to memory of 1492 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 35 PID 2420 wrote to memory of 1492 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 35 PID 2420 wrote to memory of 1492 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 35 PID 2420 wrote to memory of 1492 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 35 PID 2420 wrote to memory of 1492 2420 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 35 PID 2096 wrote to memory of 1104 2096 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 36 PID 2096 wrote to memory of 1104 2096 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 36 PID 2096 wrote to memory of 1104 2096 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 36 PID 2096 wrote to memory of 1104 2096 JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe 36 PID 1104 wrote to memory of 1276 1104 explorer.exe 37 PID 1104 wrote to memory of 1276 1104 explorer.exe 37 PID 1104 wrote to memory of 1276 1104 explorer.exe 37 PID 1104 wrote to memory of 1276 1104 explorer.exe 37 PID 1104 wrote to memory of 1952 1104 explorer.exe 39 PID 1104 wrote to memory of 1952 1104 explorer.exe 39 PID 1104 wrote to memory of 1952 1104 explorer.exe 39 PID 1104 wrote to memory of 1952 1104 explorer.exe 39 PID 1104 wrote to memory of 1952 1104 explorer.exe 39 PID 1104 wrote to memory of 1952 1104 explorer.exe 39 PID 1104 wrote to memory of 1952 1104 explorer.exe 39 PID 1104 wrote to memory of 1952 1104 explorer.exe 39 PID 1104 wrote to memory of 1952 1104 explorer.exe 39 PID 1104 wrote to memory of 1952 1104 explorer.exe 39 PID 1104 wrote to memory of 1952 1104 explorer.exe 39 PID 1104 wrote to memory of 1952 1104 explorer.exe 39 PID 1104 wrote to memory of 1952 1104 explorer.exe 39 PID 1104 wrote to memory of 1952 1104 explorer.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
PID:1276
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1952 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1880 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2312
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2352 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵
- Executes dropped EXE
PID:2036 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1732
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵
- Executes dropped EXE
PID:920
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2372
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1624
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2508 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1636 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:836
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:2920
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:344
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2968
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2972 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵
- System Location Discovery: System Language Discovery
PID:2416
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2856
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2928
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1256 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:1276
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
PID:828
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:1592
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2336
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3040 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵
- System Location Discovery: System Language Discovery
PID:3004 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
PID:2624
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:2976
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:1744
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1056
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:932 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2912
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1168
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:1824
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:784
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:844
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1992 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵
- System Location Discovery: System Language Discovery
PID:1576 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵PID:904
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:348
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:1796
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1948
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2852 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2640
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2944
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2860
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:324 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:1968
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2724
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2644
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:796
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2796
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2012
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2076
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1080
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2280
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1792
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2444
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1988
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1716
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:688
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1696
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:304
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1028
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2328
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2572
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1080
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2068
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2264
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2548
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2840
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:776
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1084
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1368
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:768
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1376
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1764
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1668
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2216
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2896
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2008
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2984
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1816
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1352
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:476
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- System Location Discovery: System Language Discovery
PID:556
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1944
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- System Location Discovery: System Language Discovery
PID:1948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2348
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:316
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2084
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- System Location Discovery: System Language Discovery
PID:1388
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Drops file in Windows directory
PID:1804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1444
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1168
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:992
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:1492
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5fc390106d866a31e3f0fc8993fcc3406
SHA1e8c00c71f362d578174b00880a16144be3f4a143
SHA256a98afe406a6d956d42af8c2e5715e7d595f216489eb1cbb24f32f8167b07ff78
SHA5124193aa3b265a7ad833db48a3b8c51402311888a8b88d87cd9582e45742c4d79260a53963077fd85383a2a4a536a1f658b3d9d89bc1afbf3a3939f7ecba5582f7
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
2.9MB
MD588b379c3c1bf26f5ff39526846525206
SHA14abd5e7eea0b53990c4e147bf46e9bf47fc39dc5
SHA256accdad3a3cd6eaf2a9eda3c1bb49f78db9aa63f74617093008e22afce6be8ae7
SHA5123fec0820f3a81a68580d81bc588db6a6ea3bd519308600905df41d252df1dd21f80332204465662eb5d282bc185a3e7122e2642b6d6738911a70704449521df8
-
Filesize
2.9MB
MD5791a9344112fffabff8a20456d24f2a6
SHA14ba249651761d8117376061b4a4fd563bd9712a6
SHA256b3156d07693ac6edf2a045c2d4bc75db72eb5fc0cbe27b2bbb758bbb675c7858
SHA51218447acb55bf7ef83ef3c4333ec3c960e279427ca13720771ce40a999c89c32f56b85be17251bcdeb192888ef569a333141c6ed8475c01f4ec702ddcef68d5ea