Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 06:58
Behavioral task
behavioral1
Sample
8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe
Resource
win7-20241010-en
General
-
Target
8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe
-
Size
2.2MB
-
MD5
b695b1a794ce70d0c5a7e17e74864040
-
SHA1
3c0641adeef103dd4fc2e81b155a57e3eef40331
-
SHA256
8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdc
-
SHA512
2735418eb9174c942eb0c495ff30a3ba8ecddfef8340aa666d7b70dd7229cd73a7f757fb5cca1191caba49ed2fbfcb38e0592bd8fde6d411ec6862ed631f87f7
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZc:0UzeyQMS4DqodCnoe+iitjWwwo
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe -
Executes dropped EXE 50 IoCs
pid Process 2560 explorer.exe 2392 explorer.exe 340 spoolsv.exe 548 spoolsv.exe 1516 spoolsv.exe 1148 spoolsv.exe 1556 spoolsv.exe 2204 spoolsv.exe 2168 spoolsv.exe 2912 spoolsv.exe 2340 spoolsv.exe 1960 spoolsv.exe 780 spoolsv.exe 2964 spoolsv.exe 2516 spoolsv.exe 2852 spoolsv.exe 2932 spoolsv.exe 2408 spoolsv.exe 2328 spoolsv.exe 2028 spoolsv.exe 3040 spoolsv.exe 2224 spoolsv.exe 2820 spoolsv.exe 2900 spoolsv.exe 704 spoolsv.exe 2020 spoolsv.exe 1228 spoolsv.exe 1996 spoolsv.exe 2832 spoolsv.exe 1116 spoolsv.exe 2280 spoolsv.exe 2388 spoolsv.exe 3000 spoolsv.exe 2744 spoolsv.exe 2756 spoolsv.exe 332 spoolsv.exe 1084 spoolsv.exe 1512 spoolsv.exe 1772 spoolsv.exe 2488 spoolsv.exe 2128 spoolsv.exe 1964 spoolsv.exe 1588 spoolsv.exe 2836 spoolsv.exe 2400 spoolsv.exe 2952 spoolsv.exe 2800 spoolsv.exe 1252 spoolsv.exe 2108 spoolsv.exe 1912 spoolsv.exe -
Loads dropped DLL 64 IoCs
pid Process 2764 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 2764 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 844 set thread context of 2764 844 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 31 PID 2560 set thread context of 2392 2560 explorer.exe 33 -
Drops file in Windows directory 52 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe File opened for modification \??\c:\windows\system\explorer.exe 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 52 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 2764 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 2764 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe 2392 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 844 wrote to memory of 1748 844 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 30 PID 844 wrote to memory of 1748 844 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 30 PID 844 wrote to memory of 1748 844 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 30 PID 844 wrote to memory of 1748 844 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 30 PID 844 wrote to memory of 2764 844 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 31 PID 844 wrote to memory of 2764 844 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 31 PID 844 wrote to memory of 2764 844 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 31 PID 844 wrote to memory of 2764 844 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 31 PID 844 wrote to memory of 2764 844 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 31 PID 844 wrote to memory of 2764 844 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 31 PID 2764 wrote to memory of 2560 2764 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 32 PID 2764 wrote to memory of 2560 2764 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 32 PID 2764 wrote to memory of 2560 2764 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 32 PID 2764 wrote to memory of 2560 2764 8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe 32 PID 2560 wrote to memory of 2392 2560 explorer.exe 33 PID 2560 wrote to memory of 2392 2560 explorer.exe 33 PID 2560 wrote to memory of 2392 2560 explorer.exe 33 PID 2560 wrote to memory of 2392 2560 explorer.exe 33 PID 2560 wrote to memory of 2392 2560 explorer.exe 33 PID 2560 wrote to memory of 2392 2560 explorer.exe 33 PID 2392 wrote to memory of 340 2392 explorer.exe 34 PID 2392 wrote to memory of 340 2392 explorer.exe 34 PID 2392 wrote to memory of 340 2392 explorer.exe 34 PID 2392 wrote to memory of 340 2392 explorer.exe 34 PID 2392 wrote to memory of 548 2392 explorer.exe 35 PID 2392 wrote to memory of 548 2392 explorer.exe 35 PID 2392 wrote to memory of 548 2392 explorer.exe 35 PID 2392 wrote to memory of 548 2392 explorer.exe 35 PID 2392 wrote to memory of 1516 2392 explorer.exe 36 PID 2392 wrote to memory of 1516 2392 explorer.exe 36 PID 2392 wrote to memory of 1516 2392 explorer.exe 36 PID 2392 wrote to memory of 1516 2392 explorer.exe 36 PID 2392 wrote to memory of 1148 2392 explorer.exe 37 PID 2392 wrote to memory of 1148 2392 explorer.exe 37 PID 2392 wrote to memory of 1148 2392 explorer.exe 37 PID 2392 wrote to memory of 1148 2392 explorer.exe 37 PID 2392 wrote to memory of 1556 2392 explorer.exe 38 PID 2392 wrote to memory of 1556 2392 explorer.exe 38 PID 2392 wrote to memory of 1556 2392 explorer.exe 38 PID 2392 wrote to memory of 1556 2392 explorer.exe 38 PID 2392 wrote to memory of 2204 2392 explorer.exe 39 PID 2392 wrote to memory of 2204 2392 explorer.exe 39 PID 2392 wrote to memory of 2204 2392 explorer.exe 39 PID 2392 wrote to memory of 2204 2392 explorer.exe 39 PID 2392 wrote to memory of 2168 2392 explorer.exe 40 PID 2392 wrote to memory of 2168 2392 explorer.exe 40 PID 2392 wrote to memory of 2168 2392 explorer.exe 40 PID 2392 wrote to memory of 2168 2392 explorer.exe 40 PID 2392 wrote to memory of 2912 2392 explorer.exe 41 PID 2392 wrote to memory of 2912 2392 explorer.exe 41 PID 2392 wrote to memory of 2912 2392 explorer.exe 41 PID 2392 wrote to memory of 2912 2392 explorer.exe 41 PID 2392 wrote to memory of 2340 2392 explorer.exe 42 PID 2392 wrote to memory of 2340 2392 explorer.exe 42 PID 2392 wrote to memory of 2340 2392 explorer.exe 42 PID 2392 wrote to memory of 2340 2392 explorer.exe 42 PID 2392 wrote to memory of 1960 2392 explorer.exe 43 PID 2392 wrote to memory of 1960 2392 explorer.exe 43 PID 2392 wrote to memory of 1960 2392 explorer.exe 43 PID 2392 wrote to memory of 1960 2392 explorer.exe 43 PID 2392 wrote to memory of 780 2392 explorer.exe 44 PID 2392 wrote to memory of 780 2392 explorer.exe 44 PID 2392 wrote to memory of 780 2392 explorer.exe 44 PID 2392 wrote to memory of 780 2392 explorer.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe"C:\Users\Admin\AppData\Local\Temp\8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe"C:\Users\Admin\AppData\Local\Temp\8a13e205c3c582a1003994fc575948390501fcb4c5555993a4a2abbc616f4fdcN.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:340 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2428
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:548 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1364
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2460
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1516 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2336
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1148 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1372
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1556 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1476
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1008
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2204 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1384
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2168
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2912 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1804
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2340
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1960 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3288
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:780
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2964
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2516
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2852
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2932
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2408
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2328
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2028
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3040
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2224
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2820
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2900
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:704
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2020
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1228
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1996
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2832
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1116
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2280
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2388
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3000
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2744
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2756
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:332
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1084
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1512
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1772
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2488
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2128
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1964
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1588
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2836
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2400
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2952
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2800
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1252
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2108
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1912
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2876
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1648
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2140
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD583f1436afac4403a8db55428cb438c7d
SHA1ae5c0bcc4410cde7c567b13e0f35fad4192e8c99
SHA25651684981375fe5d8a4b776f0103f45d9082dc88cc249ecb1d4c1595bb5b69d37
SHA512d7e69b5001784c5354f353337978e85576373d2d97bef68d084709c81de0c0181962df37285b98d9c3a9ae4a1a659088ea9821dc45cf69ae3dd41df721440260
-
Filesize
2.2MB
MD584b24d8f616a0867e5f9bb892739a690
SHA1063be4c8eab3008e54dccc81abda0b4aeeeea241
SHA25656f9ad62fb7c527afd7c67792e395c31f67c93496b89eaf7a317e5dd178d9122
SHA512e9bc749e85bddc53a1f4328a46b2a804f1a4ad935ba6afb9e82e68ec71b1a970bc085305638c8e788608fcdf79f6fa0b5bbeb98231f794e3d0a50615aa426e05