Analysis
-
max time kernel
97s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 10:14
Behavioral task
behavioral1
Sample
f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe
Resource
win10v2004-20241007-en
General
-
Target
f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe
-
Size
2.2MB
-
MD5
b86af439d6fe70d6d9e684022d7ad3b0
-
SHA1
9323ebcb163b3b5595283c6bb26ad9a02aaebe64
-
SHA256
f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797
-
SHA512
c865a481ef41a5a2ca602dac290be93015dc23d370a85da0942c7508fe8f044284596df0d873a6dd0b70af8f17bd5728cca2aef25a62b391e6d52f6bffa7ab28
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZY:0UzeyQMS4DqodCnoe+iitjWww0
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe -
Executes dropped EXE 44 IoCs
pid Process 4072 explorer.exe 3604 explorer.exe 4476 spoolsv.exe 4900 spoolsv.exe 4876 spoolsv.exe 4424 spoolsv.exe 1196 spoolsv.exe 2260 spoolsv.exe 924 spoolsv.exe 4236 spoolsv.exe 2736 spoolsv.exe 1404 spoolsv.exe 1360 spoolsv.exe 1176 spoolsv.exe 5044 spoolsv.exe 4812 spoolsv.exe 1272 spoolsv.exe 2616 spoolsv.exe 1540 spoolsv.exe 3764 spoolsv.exe 4320 spoolsv.exe 3364 spoolsv.exe 3980 spoolsv.exe 4528 spoolsv.exe 4432 spoolsv.exe 1500 spoolsv.exe 3972 explorer.exe 3312 spoolsv.exe 4936 spoolsv.exe 4404 spoolsv.exe 4292 spoolsv.exe 4032 explorer.exe 4156 spoolsv.exe 1684 explorer.exe 4740 spoolsv.exe 1120 spoolsv.exe 4736 spoolsv.exe 3148 spoolsv.exe 492 explorer.exe 1936 spoolsv.exe 2988 spoolsv.exe 1020 spoolsv.exe 3680 spoolsv.exe 2352 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 1176 set thread context of 1640 1176 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 98 PID 4072 set thread context of 3604 4072 explorer.exe 103 PID 4476 set thread context of 1500 4476 spoolsv.exe 127 PID 4900 set thread context of 4936 4900 spoolsv.exe 130 PID 4876 set thread context of 4292 4876 spoolsv.exe 132 PID 4424 set thread context of 4156 4424 spoolsv.exe 134 PID 1196 set thread context of 1120 1196 spoolsv.exe 137 PID 2260 set thread context of 3148 2260 spoolsv.exe 139 PID 924 set thread context of 2988 924 spoolsv.exe 142 PID 4236 set thread context of 3680 4236 spoolsv.exe 144 -
Drops file in Windows directory 37 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 1640 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 1640 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 1640 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 1640 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 3604 explorer.exe 1500 spoolsv.exe 1500 spoolsv.exe 4936 spoolsv.exe 4936 spoolsv.exe 4292 spoolsv.exe 4292 spoolsv.exe 4156 spoolsv.exe 4156 spoolsv.exe 1120 spoolsv.exe 1120 spoolsv.exe 3148 spoolsv.exe 3148 spoolsv.exe 2988 spoolsv.exe 2988 spoolsv.exe 3680 spoolsv.exe 3680 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1176 wrote to memory of 3676 1176 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 83 PID 1176 wrote to memory of 3676 1176 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 83 PID 1176 wrote to memory of 1640 1176 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 98 PID 1176 wrote to memory of 1640 1176 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 98 PID 1176 wrote to memory of 1640 1176 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 98 PID 1176 wrote to memory of 1640 1176 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 98 PID 1176 wrote to memory of 1640 1176 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 98 PID 1640 wrote to memory of 4072 1640 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 99 PID 1640 wrote to memory of 4072 1640 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 99 PID 1640 wrote to memory of 4072 1640 f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe 99 PID 4072 wrote to memory of 3604 4072 explorer.exe 103 PID 4072 wrote to memory of 3604 4072 explorer.exe 103 PID 4072 wrote to memory of 3604 4072 explorer.exe 103 PID 4072 wrote to memory of 3604 4072 explorer.exe 103 PID 4072 wrote to memory of 3604 4072 explorer.exe 103 PID 3604 wrote to memory of 4476 3604 explorer.exe 104 PID 3604 wrote to memory of 4476 3604 explorer.exe 104 PID 3604 wrote to memory of 4476 3604 explorer.exe 104 PID 3604 wrote to memory of 4900 3604 explorer.exe 105 PID 3604 wrote to memory of 4900 3604 explorer.exe 105 PID 3604 wrote to memory of 4900 3604 explorer.exe 105 PID 3604 wrote to memory of 4876 3604 explorer.exe 106 PID 3604 wrote to memory of 4876 3604 explorer.exe 106 PID 3604 wrote to memory of 4876 3604 explorer.exe 106 PID 3604 wrote to memory of 4424 3604 explorer.exe 107 PID 3604 wrote to memory of 4424 3604 explorer.exe 107 PID 3604 wrote to memory of 4424 3604 explorer.exe 107 PID 3604 wrote to memory of 1196 3604 explorer.exe 108 PID 3604 wrote to memory of 1196 3604 explorer.exe 108 PID 3604 wrote to memory of 1196 3604 explorer.exe 108 PID 3604 wrote to memory of 2260 3604 explorer.exe 109 PID 3604 wrote to memory of 2260 3604 explorer.exe 109 PID 3604 wrote to memory of 2260 3604 explorer.exe 109 PID 3604 wrote to memory of 924 3604 explorer.exe 110 PID 3604 wrote to memory of 924 3604 explorer.exe 110 PID 3604 wrote to memory of 924 3604 explorer.exe 110 PID 3604 wrote to memory of 4236 3604 explorer.exe 111 PID 3604 wrote to memory of 4236 3604 explorer.exe 111 PID 3604 wrote to memory of 4236 3604 explorer.exe 111 PID 3604 wrote to memory of 2736 3604 explorer.exe 112 PID 3604 wrote to memory of 2736 3604 explorer.exe 112 PID 3604 wrote to memory of 2736 3604 explorer.exe 112 PID 3604 wrote to memory of 1404 3604 explorer.exe 113 PID 3604 wrote to memory of 1404 3604 explorer.exe 113 PID 3604 wrote to memory of 1404 3604 explorer.exe 113 PID 3604 wrote to memory of 1360 3604 explorer.exe 114 PID 3604 wrote to memory of 1360 3604 explorer.exe 114 PID 3604 wrote to memory of 1360 3604 explorer.exe 114 PID 3604 wrote to memory of 1176 3604 explorer.exe 115 PID 3604 wrote to memory of 1176 3604 explorer.exe 115 PID 3604 wrote to memory of 1176 3604 explorer.exe 115 PID 3604 wrote to memory of 5044 3604 explorer.exe 116 PID 3604 wrote to memory of 5044 3604 explorer.exe 116 PID 3604 wrote to memory of 5044 3604 explorer.exe 116 PID 3604 wrote to memory of 4812 3604 explorer.exe 117 PID 3604 wrote to memory of 4812 3604 explorer.exe 117 PID 3604 wrote to memory of 4812 3604 explorer.exe 117 PID 3604 wrote to memory of 1272 3604 explorer.exe 118 PID 3604 wrote to memory of 1272 3604 explorer.exe 118 PID 3604 wrote to memory of 1272 3604 explorer.exe 118 PID 3604 wrote to memory of 2616 3604 explorer.exe 119 PID 3604 wrote to memory of 2616 3604 explorer.exe 119 PID 3604 wrote to memory of 2616 3604 explorer.exe 119 PID 3604 wrote to memory of 1540 3604 explorer.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe"C:\Users\Admin\AppData\Local\Temp\f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3676
-
-
C:\Users\Admin\AppData\Local\Temp\f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe"C:\Users\Admin\AppData\Local\Temp\f94b92bb16f79950fddd2572107fd4b3d6f1b9e327db4954b6adab435f9e2797N.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4072 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3604 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4476 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1500 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3972 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1556
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4900 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4936
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4876 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4292 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4032 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2740
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4424 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4156 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1684 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4228
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1196 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1120
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2260 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3148 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:492
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:924 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2988
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4236 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3680 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2352
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2736 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2152
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1404 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4772
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2804
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1360 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2188
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1176 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1908
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2528
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5044 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4496
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4812 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:448
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2408
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1272 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:184
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3448
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2616 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5064
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1540 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3444
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3396
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3764 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1536
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4320 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3076
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1940
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3364 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3328
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3980 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2656
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2316
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4528 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3648
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4432 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4136
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3552
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3312 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1912
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4404 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2708
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4924
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4740
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4736
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1936
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1020
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3952
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4872
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3100
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4396
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3500
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1180
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4960
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2792
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1276
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1544
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2800
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3608
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3068
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4412
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5bf198787fa4b82e48d8740de2bfcf7bf
SHA1775960dd93778062b3f1d81a0cbdfd64448032c6
SHA256e2aac6f7e0ffaf0aa8cb975b97af62dffeda173dd3bf5b0daaf7dcda45dea0dc
SHA51235044c2cca931ed4e991eac19f0cae3e41d15dea0cc109ce1ded79a3bc11d2d151d067539ac3e880887e4a1ffef786be4acf96a9f6db9448c2767536423a506b
-
Filesize
2.2MB
MD530f933e0547ae532568fcd130c93d3f8
SHA1a87eb442507a9694133dafd4b0aad95fb04fd0c8
SHA2560749d3391150edc2ac94a11253e414321bde2d24e14b5b22b6c1f5a5cd21dd02
SHA51264f7a742cb4644814505b2a6270c01f0064c590a26e5c14cffb2c5ab1afb3b433c556262ac0e1fc987a7782974496744b37e35162ca8ab44123c807dbbdbb1de