Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe
-
Size
689KB
-
MD5
c7107a245b566b976846e8dd62fa2db6
-
SHA1
eef135e4f3bfc86cafc3c04ef0d947784a4cefeb
-
SHA256
7997b23c4aa24f9cc7f1c48c78665dfc636327bd7529e9127b89f28483f9f551
-
SHA512
19f6075abe251c383f74f46fd7672d19c6f30124b0cc417f023bead824175066672e4709018777175660551cd88a61ebf1b8bf946ab5421b846ec1ec6296c67c
-
SSDEEP
12288:pANwRo+mv8QD4+0V16ue1rl5FP+7uVkEMYKQ77OJQsg6F7bgIGuuyJ4FAtgBRjW:pAT8QE+khGlLWWFUQ77OJQF6JExuuyl3
Malware Config
Extracted
azorult
http://anorelier.hk/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral1/memory/2312-134-0x0000000000400000-0x0000000003718000-memory.dmp family_vidar -
Executes dropped EXE 2 IoCs
pid Process 2312 wotsuper.exe 2468 wotsuper1.exe -
Loads dropped DLL 4 IoCs
pid Process 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Advanced SystemCare = "\"C:\\Program Files (x86)\\IObit\\Advanced SystemCare\\ASCTray.exe\" /Auto" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\wotsuper regedit.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 15 iplogger.org 16 iplogger.org 17 iplogger.org 18 iplogger.org 5 iplogger.org 6 iplogger.org 14 iplogger.org 4 iplogger.org 19 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\wotsuper\wotsuper\wotsuper1.exe c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\wotsuper\wotsuper\Uninstall.exe c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe File created C:\Program Files (x86)\wotsuper\wotsuper\Uninstall.ini c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\wotsuper.reg c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wotsuper1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wotsuper.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wotsuper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wotsuper.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD064F91-654C-11EF-AE10-CEBD2182E735} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431018442" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d03dba9459f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1172 regedit.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2312 wotsuper.exe 2312 wotsuper.exe 2312 wotsuper.exe 2312 wotsuper.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 936 iexplore.exe 1696 iexplore.exe 2836 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2836 iexplore.exe 2836 iexplore.exe 1696 iexplore.exe 1696 iexplore.exe 936 iexplore.exe 936 iexplore.exe 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1696 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 28 PID 3068 wrote to memory of 1696 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 28 PID 3068 wrote to memory of 1696 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 28 PID 3068 wrote to memory of 1696 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 28 PID 3068 wrote to memory of 2312 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 29 PID 3068 wrote to memory of 2312 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 29 PID 3068 wrote to memory of 2312 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 29 PID 3068 wrote to memory of 2312 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 29 PID 3068 wrote to memory of 2836 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2836 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2836 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2836 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2468 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 31 PID 3068 wrote to memory of 2468 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 31 PID 3068 wrote to memory of 2468 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 31 PID 3068 wrote to memory of 2468 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 31 PID 3068 wrote to memory of 1172 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 32 PID 3068 wrote to memory of 1172 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 32 PID 3068 wrote to memory of 1172 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 32 PID 3068 wrote to memory of 1172 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 32 PID 3068 wrote to memory of 936 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 33 PID 3068 wrote to memory of 936 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 33 PID 3068 wrote to memory of 936 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 33 PID 3068 wrote to memory of 936 3068 c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe 33 PID 2836 wrote to memory of 2552 2836 iexplore.exe 35 PID 2836 wrote to memory of 2552 2836 iexplore.exe 35 PID 2836 wrote to memory of 2552 2836 iexplore.exe 35 PID 2836 wrote to memory of 2552 2836 iexplore.exe 35 PID 1696 wrote to memory of 2544 1696 iexplore.exe 36 PID 1696 wrote to memory of 2544 1696 iexplore.exe 36 PID 1696 wrote to memory of 2544 1696 iexplore.exe 36 PID 1696 wrote to memory of 2544 1696 iexplore.exe 36 PID 936 wrote to memory of 1484 936 iexplore.exe 37 PID 936 wrote to memory of 1484 936 iexplore.exe 37 PID 936 wrote to memory of 1484 936 iexplore.exe 37 PID 936 wrote to memory of 1484 936 iexplore.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7107a245b566b976846e8dd62fa2db6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RE8i7.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
-
-
C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe"C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1iB8r7.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
-
C:\Program Files (x86)\wotsuper\wotsuper\wotsuper1.exe"C:\Program Files (x86)\wotsuper\wotsuper\wotsuper1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" \s C:\Windows\wotsuper.reg2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1172
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/10f7w3.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:936 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1484
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5276a97adb44e4cce4549fe20a28ffdb3
SHA1d35768c7b9d30907f575c0042bf6355bdce0add5
SHA256fe6da117e9d3b643f7e80309470c622a3fcaa7a3b395955a6ee8660453948d2a
SHA512190aa8913ca65228e800809307cf27eca6686e62ac31bf484c8ab7e0355bc94ba09ab5481249018296305dcb5235e3b4cd0c98957c89fb0a72e7a916112496cc
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f4e713e001e995dcff83c4b4caf8963a
SHA1c42b7dd388b0a734da31471807def6c465bb9781
SHA2563666a2815d13f7059e52461639fa66e3c77184ed4b1f8f1360bee6234bd5ab0f
SHA512b9108b738b51f885129ab167c764f9e4c2236ad69c76fe125c1fc9275f6b7791ee9a9dff97fb7563811436ab0e5220955ee8ae1ebf43a87f6198022979864271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD583129105d8111f3fc06f196688944de9
SHA16b63ee5836cb065f002122e0a3c83523221067d8
SHA256e9c4dd5dc063c3f1f92e22e45c9f163faae377f84cfa7e3daa6b74fd99e9fc27
SHA512de67c5dbe9bfe2293886cdb38edaafa3e45b2c079f6bb9b7d732af71ccb0e73b109a2666e52b3f4e773e74337f1ba4f418c663df2079404734c9aefa7425a8b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5a52f6f133addeac0316fafa84420661b
SHA123395cb5e86374b52a56467f8fe887311ab2ea67
SHA2565842227f38e95b55892a058e4eda4c044a4bb428cc569f8f5a896a84efaa31dd
SHA5122a03923cb7ef38b5cb27f925371219866f080b67c61e5da0c87270a39c6bcd09cb3574a3cadef7b28efedc55585dc66d7880b2e989a9dceb873d4f3f8ef6e532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2972bf5ce2bfc52f64d657e89ed7e7a
SHA1f86fa87c1ca68d3032423f13148f1ad9a699965c
SHA2567c68f96a86a3351e5a5017234e7c637f6d1f3c5f7a82df9773b908820d212e01
SHA512ed436fdbe9ba7b3c3dadbf0691e147b5e06db20ebf0ed3aefafc659af1c01badef0919abd78083e0010dd3819461d59db03cedcd59b1f6911248c873b76e13f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5671822742d87b8bade1bee9bb5631fe0
SHA14b6582d96187671752adaedc6e9b9f4f48f3a562
SHA256ab23113f3699589fba55be294204a0aa6cd370265bd3a8b7a8bcab1adffacc2f
SHA512a18e52d23427b9924f5d8b95b09979805123b73194792284ee3d009b768bb9115c9427e99711e83852620a54fd2b638fb5c9a7da714dda6756f09bb2c88bb29c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598f0555299cd85f068cc896b18417291
SHA1b86443f7202190c2107d1cf33fa36cdeb59a20b6
SHA2561447e98bbecd0fee4ee1ac6fffca9b22d8d207a53c9800f2dcee95ea77e16db0
SHA512b3c11ca229d35e45ed3cc7e7a37e1f9af1b1309effa046e4507418b2ca374ece438ad9d402d6afbe4070fbc2a99a66a7c80e249d2fd5191608e11e488d8246d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50cd54153a57e0e5cdf18d0e0d6d489
SHA19a5842bcc4c5a39136ef108a0f606a4dab3050ab
SHA256c28f184e64469adb7db7d4f03273d38b467f80dfe8ad69a3a7dd8ec31de65e01
SHA5122dd2336b082ac7eb47a54dc50eaa63ef58eb96f9fd5344af7c48c12ba12e4ba3308d22c39d234700a1bf5c50776d457747a0386432cb55a53a42778b0721f52a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb5a295b54ad206e27f0d7d00d735b8
SHA125db918ff1b80c0c416b09f162098d6fb271ec73
SHA256fa4aa7372d916649f922e268ae57ef8ae5fa33505914986c3d10006dcb231076
SHA512b099eefe8981501da9e6d68de6450ce945e19fe73f1859d4c71fe692727f99e9bd2ad4bb501f0f721b7e1de9a900274a4971c330adc04273ba6f193f3738d344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537b8425149ab21ed5a7a1d910ad91924
SHA15bc41501fb31fc44bb9f07d3b0acc2214a880e52
SHA256148b1dbc31e0b4bf1328f4790f81d11b91b9c7f76bbb8285f37bf71e560dc978
SHA512dd006bfec01c983b0493daeb8925f58f3d7b0b61a1111605f99780d0cec374c4d138bcbcbb204cff2251fba328e8b7ae98efad00912ef65906f6a5a868988b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daae20515cbf59028796153ba379d0ab
SHA1c5c3f84433f6a1985865a8c3ec7a8f8bbff04a6b
SHA256678a5735826c2b18bd41bb924cc664d7fadca640339844cff97596f93276920e
SHA512c7d4c42f0dec927d12f11ad747d07e67f4b71e71b2e7cf2134a65c779964e04f407ff7d86c47db4bc4bfe4af355ec59a73ffdda54ce262541ff03fc384c720f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae82436527c745664b99045bef7fc603
SHA14c867fb2ea778fbac36d8d78d8096de51040f807
SHA256fc93223fcd794880c5d2c05813c17857cb3c440b7792ea71430cfc4aed12b8de
SHA51201c7c62b2eac60f8eb093b3a9dc5b3d4b3d41054f7ab38aefb4ef6a63937adff1773d6d02cc131d3c206cb1dcc5713be5d206ff997c254c6a2da983639f8bc75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545780289238fdb98b79e3c2ab48fcec5
SHA13166e0bba12630cdfb403c419552c918306d5b16
SHA2566fa8b9c97888c7dcbdcad2f761cd0a6bb525ea75b37760231bc095a631de04ae
SHA512301854e8886f89e8e2954298eaae26a251852c924861e25569e767446fc045e6c240afb1dc96b98d85e9047f837cc6b6778829ac3bf98194486ed68e3e7ca3c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba1fe6b5f5447e4ac13dc278fdde223
SHA125a53662b2ed242d6ed81029e778bff03bb8a554
SHA256ec5c7bb7aed54b9eae2a0318b3a9117be9331d14a23db442eb0e921104076b99
SHA512e1e41df7b86179fba19c1b46f40d4e80e55408cf690d8ca16dc452aa5d5594fb489e68275967a25395aca3aab590a5c25d7469c0940fe9ff29bd9737ef96e7d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3790eabc2300a8ba9d81dcc58334454
SHA1da5f16fcd8f9c4dcdb61bfa276614a08f8be207c
SHA256804f609e1583510b0732e678af5ad297f371bc80d5af8f26624cc0b2d6b64155
SHA5123219feacb477f48fd37902f37ca1586f3b4f659ddc635335b8bc1296fc21aa382865a466c750332c05f76944e5b638cbc53d1aebcc6594056546a23037c332cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50589f57f42fd4f39c2dc4b50795daeee
SHA1ad22ac2a60fcae1bdf4837a7cf0fc35779a7ab29
SHA25678a1ab47bc73cd32611ef9ce05c998cf62429ae370a0a9ab91300260d853fa6d
SHA5120a5aaeaf733232f1a8c3e8e9f61e42dfe38a1b53570187b46fe1620257789b0f7b4034b8fcd8c08df746a1446970f1eceb752c9edc077406529526c58b624179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9eecff8da2911ab12b3b8d98a2345a
SHA154d0b9273576676a5a2e9307670335f473360f06
SHA256523a05a4398af63ce6cc7d17437ca3efc5d45d57982ffc4ccd6f657b88d568e0
SHA512de427c995ea1fd45712c4b9160197768aaa0a09cc14e45821035f52764eb9795aee4f52698085906e59a2bb8409318a37f94a47a96124be928850142a285fca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59134026658fd9eea1cd71facb29901f9
SHA12284b16cb500df87451499f9e6c05e67344a6196
SHA256b962be041be5bcae72c794618f74b5e0ddb766c553454fcf2cee53b2abee872e
SHA512d81afbed4a2816c4eb91485bbec5fab5111a6a4e9f6fe31df0723c2fab2f1ddd42537c7bcfa2b655ed39fb550104aa1b261146050814661b9191fbf5a06fe379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5081a62b04f924b548c5fc89cfef124cb
SHA1ffe2319d01d82f14e69e0dc91a52474cb7128f95
SHA256dfe69512be5aa6776384eba5235aaa0dc3e93ccd7126e7ecf8d9f54610b33e2e
SHA5121b0ab7dbf567a04dc1b2eb59fe2a5022ac0aa2bc5fbd9d67c2830e65dfe59bbf264282c3f3aa21872a2b401baa771b0fbd521fc464418ab047b5075f5cfd83b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD55130a803c23bddf5c80d09f4a9f5fcdb
SHA1591c65820aa23e8922ab7e0f419d0b7064ac28e7
SHA2560814aa34c32f5088728f393789836423ef7c59765990b14e79d3b8ed399a027f
SHA51283e92f4dc61b681ee45f3eaa243a614112042d8c648e47cf1c61478e7589bf3461e73c0901afbbabf1cd63806174834f47d64bab40fb2334df82eda35c89abd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD593a0e43782907e0f0b9883780cafe013
SHA12fd75c2a5015d5bf65d5912c052e38adb130528f
SHA256c16b8cc5fa977cc68d3c85ca398ab800dc26945b27e8db2c588756d827d46da2
SHA51278adb2f67aad5b9f938af374b7f71a80fb29ce2238b12d8198f9db04bff6e11a58f3b78167cfd35dc50cd10b5785f744b8f5ef34e6a4719e002975136fdc8a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53f70d92817536d4bc617efc5d27d26e0
SHA16268db3d3062484f8ae493833e15457846026054
SHA256e0b0f7e3365747818f3d7931c94692c46e9464fdb2a21fa08efb8d23dd260210
SHA5123be32507c1a8dbea182996075ee6d22644f6ac63064794faeaf373c1fdd2b2ef2025c7902bb76a6ded66794fecdcdc11fc1e9f83042e446ae958fac7b3f4fa7e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BCF80751-654C-11EF-AE10-CEBD2182E735}.dat
Filesize5KB
MD5c39b144e4116bce2286b21149244d084
SHA106b52e13a42b2e2f0ff51b881139a541feb26eff
SHA256df524303479607867d6acc6ebc0ae04dd919bf9632eb945e66bade5588a5a057
SHA512ed851a98278a4412a46ca6713d265659552b3a863d21126c3424509f69435b8ce4f876953ad898afb254b48ac1422c462a237d36daecc2d94bcfdd554e2c0fa3
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BCFCCA11-654C-11EF-AE10-CEBD2182E735}.dat
Filesize4KB
MD5206e4a792b88d0f29252ab64628b1e75
SHA176bdd72a3d3aa89512484e1257534cb00a5f2101
SHA256b6c443fa7c39fb7936e6f8f934a88bc541981ce0fd132aff3588f0feb4bec4b5
SHA512178f2f6f7392c71f003fc5b46b8cad268836b7435e43bd6b953ccb2eb5a73cc44701f8272bfa7e330482249f64436566e1819a1fe99a820f547b09b52882e071
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BCFCCA11-654C-11EF-AE10-CEBD2182E735}.dat
Filesize3KB
MD5980cdedb52246dc7c84d531a2d9ae214
SHA185ed13078641bca210843f487ed3e0c7f213ac74
SHA256d89f65283de039536b6a72c7a18486a37573b64fd3237bb1328d0acec3749662
SHA512b94f75395c90179f922303e5541edb209b32494184c4d0adc4bf58df19020dae757d75fcbeea403ae6f9c9eb6b96d7b588513e278dafcea7d099e0b7e46fd4cd
-
Filesize
2KB
MD55c560c0a4eb972242f7599bdc0523449
SHA11708e303e95893486ddd1b896c64f2f8e317cdaf
SHA256d56204c364d0bc69c89c11c94c843e9c9b35f9bace8b910633b085bf3b4616c5
SHA51260661b591ee60755c9da7a933eec9e539f05d60fd4d5579e114faa520b42ac108ae71bc9586532873b357a2f0d7b19e727fbc4b72cf6fb696a27fcfa2e910448
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\favicon[1].png
Filesize2KB
MD518c023bc439b446f91bf942270882422
SHA1768d59e3085976dba252232a65a4af562675f782
SHA256e0e71acef1efbfab69a1a60cd8fadded948d0e47a0a27c59a0be7033f6a84482
SHA512a95ad7b48596bc0af23d05d1e58681e5d65e707247f96c5bc088880f4525312a1834a89615a0e33aea6b066793088a193ec29b5c96ea216f531c443487ae0735
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
251B
MD56d6daea138d76535db19035872825e28
SHA137cebefea841e55d1e1da79331739443526d3a70
SHA256e984257af83354e7fd6835632b01e4d994afe76f0cba7e86b4c3b0eaef04d869
SHA512b5c379f17edad0adf1d5b44e54041caedca24c4d69deff191abe501db031600a6f2d688bb16d28a44011917885a804fc02adef124e6c55b0f40f792f1790027b
-
Filesize
169B
MD58da8f9ad720b961671f5e2cfef9cee19
SHA17c994a438ef5a41faf27ccb73d6e0467f387bd68
SHA25689971fc7187fe9b261ae4e872b05ccc165198233ea70f9f988568f059491481b
SHA512af0ec0122cf9d52a2954359d197cc22afa6e09334d9a273e680ae3241785cd93ae8f747cd26278f2703296c118c5ac57add250b01c281441195bfd85aa280d68
-
Filesize
450B
MD542f073434559fb6b9c67aba86de89d1b
SHA19b969de41fc717353619068e46f21ec1db093ab5
SHA25603ac69047bce954fdce3d00af881161a073f921d73ff79369e9ee96a109f9eed
SHA512b1ae4fb02d7e629f824e084c5cd81e17be3bb37937eed7a1bfcd6aec0fd1cfe9a7299ecfc35958a5d98d11941fc6478e653b69140de02cbec28c4bf0647bd547
-
Filesize
449KB
MD5cd0b418e6133bfff4c3b9c229bd53a0d
SHA1cebaf473d0a171f6ae139057dfb76f9bc9ba9e87
SHA25631b7a91d6ee9c6010d97cad1e8d97a47e8badef7b4f7fbbaac004ff7c2ca93bf
SHA5126fb913a16755a60f0d88eb7c8941b039610e357d1e41e05c420a9fcd33b29283abb27e4a72e8dc281e06ddfd8bd980b252ce34cebbcc0592b8c575e9f92d458f