Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 01:17
Static task
static1
Behavioral task
behavioral1
Sample
f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe
-
Size
794KB
-
MD5
f6fb5d75bf7566772a043526fc3a2508
-
SHA1
96bf4f9f083d3e290356fc9fc652fd10ea979997
-
SHA256
f9a216ea7cad2d3b950157140054a44be53208dadfb2cf370750e1d1b11ae3c9
-
SHA512
83a0cc2d06a7a76b40b601cbc667d00c7c9e977b2472258019dd30fb7d7604af6f58bd80655dc1789077f72e275a9b94eb98f90f98f54dfa3dc10ed024a4ecb0
-
SSDEEP
12288:FnQSEnzQ6FcnUqma7elTcqifgMUAzx7uokpnelS2RKFn9ReDxSbsOCSsuZ:JuzQq6UqwlTcqY7epnePd81NZ
Malware Config
Extracted
xtremerat
3r9-99.no-ip.org
Signatures
-
Detect XtremeRAT payload 42 IoCs
Processes:
resource yara_rule behavioral1/memory/2364-3-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2364-4-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2364-6-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2364-8-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2696-14-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2364-23-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2652-34-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2652-36-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2632-46-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2632-49-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/1952-59-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/1952-61-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/964-71-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/964-75-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2880-84-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2880-87-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2500-96-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2500-100-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/1936-109-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/1936-111-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2852-121-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2852-125-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/3024-134-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/3024-136-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2400-146-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2400-150-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/1892-159-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/1892-162-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/748-171-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/748-175-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2888-184-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2888-187-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/928-196-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/928-200-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2956-210-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2956-213-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2412-223-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2412-227-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/1728-237-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/1728-240-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2924-250-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2924-254-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 52 IoCs
Processes:
erxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exef6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\erxll.exe restart" erxll.exe -
Deletes itself 1 IoCs
Processes:
explorer.exepid process 2696 explorer.exe -
Executes dropped EXE 51 IoCs
Processes:
erxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exepid process 2768 erxll.exe 2652 erxll.exe 2388 erxll.exe 2632 erxll.exe 804 erxll.exe 1952 erxll.exe 1604 erxll.exe 964 erxll.exe 1360 erxll.exe 2880 erxll.exe 2596 erxll.exe 2500 erxll.exe 828 erxll.exe 1936 erxll.exe 564 erxll.exe 2852 erxll.exe 1388 erxll.exe 3024 erxll.exe 2564 erxll.exe 2400 erxll.exe 2644 erxll.exe 1892 erxll.exe 1952 erxll.exe 748 erxll.exe 1000 erxll.exe 2888 erxll.exe 1756 erxll.exe 928 erxll.exe 2968 erxll.exe 2956 erxll.exe 2664 erxll.exe 2412 erxll.exe 1248 erxll.exe 1728 erxll.exe 1000 erxll.exe 2924 erxll.exe 2728 erxll.exe 2700 erxll.exe 2736 erxll.exe 2632 erxll.exe 1716 erxll.exe 2880 erxll.exe 3052 erxll.exe 1260 erxll.exe 1716 erxll.exe 2856 erxll.exe 1788 erxll.exe 2508 erxll.exe 1716 erxll.exe 1304 erxll.exe 3096 erxll.exe -
Loads dropped DLL 2 IoCs
Processes:
f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exepid process 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 52 IoCs
Processes:
erxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exef6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" erxll.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\erxl = "C:\\Windows\\InstallDir\\erxll.exe" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe -
Drops file in System32 directory 54 IoCs
Processes:
erxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exef6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exedescription ioc process File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File created C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe File opened for modification C:\Windows\SysWOW64\MSVBVM60.DLL erxll.exe -
Suspicious use of SetThreadContext 26 IoCs
Processes:
f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exedescription pid process target process PID 1116 set thread context of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 2768 set thread context of 2652 2768 erxll.exe erxll.exe PID 2388 set thread context of 2632 2388 erxll.exe erxll.exe PID 804 set thread context of 1952 804 erxll.exe erxll.exe PID 1604 set thread context of 964 1604 erxll.exe erxll.exe PID 1360 set thread context of 2880 1360 erxll.exe erxll.exe PID 2596 set thread context of 2500 2596 erxll.exe erxll.exe PID 828 set thread context of 1936 828 erxll.exe erxll.exe PID 564 set thread context of 2852 564 erxll.exe erxll.exe PID 1388 set thread context of 3024 1388 erxll.exe erxll.exe PID 2564 set thread context of 2400 2564 erxll.exe erxll.exe PID 2644 set thread context of 1892 2644 erxll.exe erxll.exe PID 1952 set thread context of 748 1952 erxll.exe erxll.exe PID 1000 set thread context of 2888 1000 erxll.exe erxll.exe PID 1756 set thread context of 928 1756 erxll.exe erxll.exe PID 2968 set thread context of 2956 2968 erxll.exe erxll.exe PID 2664 set thread context of 2412 2664 erxll.exe erxll.exe PID 1248 set thread context of 1728 1248 erxll.exe erxll.exe PID 1000 set thread context of 2924 1000 erxll.exe erxll.exe PID 2728 set thread context of 2700 2728 erxll.exe erxll.exe PID 2736 set thread context of 2632 2736 erxll.exe erxll.exe PID 1716 set thread context of 2880 1716 erxll.exe erxll.exe PID 3052 set thread context of 1260 3052 erxll.exe erxll.exe PID 1716 set thread context of 2856 1716 erxll.exe erxll.exe PID 1788 set thread context of 2508 1788 erxll.exe erxll.exe PID 1716 set thread context of 1304 1716 erxll.exe erxll.exe -
Drops file in Windows directory 2 IoCs
Processes:
f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exedescription ioc process File created C:\Windows\InstallDir\erxll.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe File opened for modification C:\Windows\InstallDir\erxll.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
Processes:
erxll.exef6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}\6.0\9\win32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL\\3" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CE46480-1A08-11CF-AD63-00AA00614F3E}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}\6.0\9\win32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL\\3" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4D651F1-7697-11D1-A1E9-00A0C90F2731}\TypeLib\Version = "6.0" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8284B8A2-A8A8-11D1-A3D2-00A0C90AEA82}\TypeLib\Version = "6.0" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32 erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{000204EF-0000-0000-C000-000000000046}\6.0\9\win32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL" erxll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32 erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{000204EF-0000-0000-C000-000000000046}\6.0\9\win32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B28FA150-0FF0-11CF-A911-00AA0062BB4C}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BE8F9800-2AAA-11CF-AD67-00AA00614F3E}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C4-4442-11D1-8906-00A0C9110049}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}\6.0\9\win32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL\\3" erxll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731} erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\ = "VBPropertyBag" erxll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4C46780-499F-101B-BB78-00AA00383CBB}\ProxyStubClsid32 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ThreadingModel = "Apartment" erxll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CBB76011-C508-11D1-A3E3-00A0C90AEA82}\TypeLib f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C5-4442-11D1-8906-00A0C9110049}\TypeLib f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4C46780-499F-101B-BB78-00AA00383CBB}\ = "_Collection" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{14E469E0-BF61-11CF-8385-8F69D8F1350B}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32 erxll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C1-4442-11D1-8906-00A0C9110049}\ProxyStubClsid32 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32 erxll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32 erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}\6.0\9\win32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL\\3" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ThreadingModel = "Apartment" erxll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{888A5A60-B283-11CF-8AD5-00A0C90AEA82}\TypeLib f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{14E469E0-BF61-11CF-8385-8F69D8F1350B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\ = "VBPropertyBag" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A4C46780-499F-101B-BB78-00AA00383CBB}\TypeLib\Version = "6.0" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CBB76011-C508-11D1-A3E3-00A0C90AEA82}\ = "AsyncProperty" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C2-4442-11D1-8906-00A0C9110049}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B28FA150-0FF0-11CF-A911-00AA0062BB4C}\TypeLib\Version = "6.0" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CE46480-1A08-11CF-AD63-00AA00614F3E} f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCFB3D2B-A0FA-1068-A738-08002B3371B5} f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}\6.0\9\win32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL\\3" erxll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8284B8A2-A8A8-11D1-A3D2-00A0C90AEA82}\TypeLib f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731} erxll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CBB76011-C508-11D1-A3E3-00A0C90AEA82}\ProxyStubClsid32 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BE8F9800-2AAA-11CF-AD67-00AA00614F3E} f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45046D60-08CA-11CF-A90F-00AA0062BB4C}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCFB3D2B-A0FA-1068-A738-08002B3371B5}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C2-4442-11D1-8906-00A0C9110049}\TypeLib\Version = "6.0" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL" erxll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32 erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}\6.0\9\win32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL\\3" erxll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C5-4442-11D1-8906-00A0C9110049} f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8284B8A2-A8A8-11D1-A3D2-00A0C90AEA82} f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ThreadingModel = "Apartment" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}\6.0\9\win32\ = "C:\\Windows\\SysWow64\\MSVBVM60.DLL\\3" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\InProcServer32\ThreadingModel = "Apartment" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BE8F9800-2AAA-11CF-AD67-00AA00614F3E}\TypeLib\Version = "6.0" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C1-4442-11D1-8906-00A0C9110049}\TypeLib f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C5-4442-11D1-8906-00A0C9110049}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5DE8D20-5BB8-11D1-A1E3-00A0C90F2731}\ = "VBPropertyBag" erxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41A7D761-6018-11CF-9016-00AA0068841E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B28FA150-0FF0-11CF-A911-00AA0062BB4C}\ProxyStubClsid32 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
Processes:
f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exeerxll.exepid process 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe 2768 erxll.exe 2388 erxll.exe 804 erxll.exe 1604 erxll.exe 1360 erxll.exe 2596 erxll.exe 828 erxll.exe 564 erxll.exe 1388 erxll.exe 2564 erxll.exe 2644 erxll.exe 1952 erxll.exe 1000 erxll.exe 1756 erxll.exe 2968 erxll.exe 2664 erxll.exe 1248 erxll.exe 1000 erxll.exe 2728 erxll.exe 2736 erxll.exe 1716 erxll.exe 3052 erxll.exe 1716 erxll.exe 1788 erxll.exe 1716 erxll.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exef6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exeerxll.exedescription pid process target process PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 1116 wrote to memory of 2364 1116 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe PID 2364 wrote to memory of 2668 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2668 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2668 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2668 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2696 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe explorer.exe PID 2364 wrote to memory of 2696 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe explorer.exe PID 2364 wrote to memory of 2696 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe explorer.exe PID 2364 wrote to memory of 2696 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe explorer.exe PID 2364 wrote to memory of 2696 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe explorer.exe PID 2364 wrote to memory of 2668 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2556 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2556 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2556 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2556 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2556 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2408 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2408 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2408 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2408 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2408 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 3020 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 3020 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 3020 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 3020 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 3020 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2560 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2560 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2560 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2560 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2560 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 864 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 864 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 864 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 864 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 864 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2804 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2804 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2804 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2804 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2804 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2724 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2724 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2724 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2724 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe iexplore.exe PID 2364 wrote to memory of 2768 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe erxll.exe PID 2364 wrote to memory of 2768 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe erxll.exe PID 2364 wrote to memory of 2768 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe erxll.exe PID 2364 wrote to memory of 2768 2364 f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe erxll.exe PID 2768 wrote to memory of 2652 2768 erxll.exe erxll.exe PID 2768 wrote to memory of 2652 2768 erxll.exe erxll.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f6fb5d75bf7566772a043526fc3a2508_JaffaCakes118.exe2⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Deletes itself
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe14⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe16⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe18⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe20⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe22⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe24⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe26⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe28⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe30⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe32⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe34⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"35⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"35⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"35⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"35⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"35⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"35⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"35⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"35⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe36⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"37⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"37⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"37⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"37⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"37⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"37⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"37⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"37⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe38⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"39⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"39⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"39⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"39⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"39⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"39⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"39⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"39⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe40⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"41⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"41⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"41⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"41⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"41⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"41⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"41⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"41⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe42⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"43⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"43⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"43⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"43⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"43⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"43⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"43⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"43⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe44⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"45⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"45⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"45⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"45⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"45⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"45⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"45⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"45⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe46⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"47⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"47⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"47⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"47⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"47⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"47⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"47⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"47⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe48⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"49⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"49⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"49⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"49⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"49⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"49⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"49⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"49⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe50⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"51⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"51⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"51⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"51⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"51⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"51⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"51⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"51⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe52⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"53⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"53⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"53⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"53⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"53⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"53⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"53⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"53⤵
-
C:\Windows\InstallDir\erxll.exe"C:\Windows\InstallDir\erxll.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\InstallDir\erxll.exeC:\Windows\InstallDir\erxll.exe54⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\((Mutex)).cfgFilesize
1KB
MD5530fc5e399b10fa79e72af28634c5a52
SHA1541d97e40da58fbc59074849639548f2f4083b50
SHA2562e9e82cfdaf61a4cca91bad42f31da60d1098489593e841c4e8d9f5bf0595702
SHA512c3dec8bb5da7150a9de6a5155f8a092534dc05d364e8fc4227e64e278b3e7bb8c659c302a953e3f0f3d38f423281ab94925868ab9528c4ed39d428f920477d5d
-
\Windows\InstallDir\erxll.exeFilesize
794KB
MD5f6fb5d75bf7566772a043526fc3a2508
SHA196bf4f9f083d3e290356fc9fc652fd10ea979997
SHA256f9a216ea7cad2d3b950157140054a44be53208dadfb2cf370750e1d1b11ae3c9
SHA51283a0cc2d06a7a76b40b601cbc667d00c7c9e977b2472258019dd30fb7d7604af6f58bd80655dc1789077f72e275a9b94eb98f90f98f54dfa3dc10ed024a4ecb0
-
memory/564-113-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/564-119-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/748-175-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/748-171-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/804-57-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/804-51-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/828-107-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/828-102-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/928-200-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/928-196-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/964-75-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/964-71-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/1000-249-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1000-177-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1000-242-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1000-182-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1116-7-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1116-0-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1248-236-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1248-229-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1360-77-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1360-81-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1388-132-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1388-127-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1604-63-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1604-69-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1728-237-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/1728-240-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/1756-188-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1756-193-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1892-159-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/1892-162-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/1936-111-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/1936-109-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/1952-163-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1952-169-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/1952-61-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/1952-59-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2364-3-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2364-8-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2364-6-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2364-4-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2364-5-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2364-23-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2388-44-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2388-38-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2400-146-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2400-150-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2412-227-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2412-223-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2500-100-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2500-96-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2564-138-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2564-144-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2596-89-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2596-94-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2632-49-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2632-46-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2644-152-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2644-157-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2652-36-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2652-34-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2664-215-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2664-222-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2696-12-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2696-14-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2728-263-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2728-256-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2768-30-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2768-24-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2852-121-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2852-125-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2880-84-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2880-87-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2888-187-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2888-184-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2924-250-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2924-254-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2956-210-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2956-213-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/2968-202-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/2968-209-0x0000000000400000-0x000000000050D000-memory.dmpFilesize
1.1MB
-
memory/3024-134-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB
-
memory/3024-136-0x0000000000C80000-0x0000000000C93000-memory.dmpFilesize
76KB