Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
fb937dc853312f620080eff6ff25b9a3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb937dc853312f620080eff6ff25b9a3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$TEMP/BetterInstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/BetterInstaller.exe
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/BetterInstaller.exe
-
Size
207KB
-
MD5
d79b88bab3231ebebd3c6505ab68ce56
-
SHA1
3222e8dab740ba1d640cc66a9cd36070969deb80
-
SHA256
d4032354c8ca3b93fd18414d6a7935bcecb18f25534b2259eeaf7d3081ec13ec
-
SHA512
b8afbd52e74d8611714a33bd80a907be8080195bd574ceb0aa8ce44520c9cf6c40ccce4a4db9be0808b8b5a6b7b0fee17ee42f9cca67d69152dd1f1d8ddd99a9
-
SSDEEP
3072:mQQVJ7raoxdBcJuAZ750rdOaq8GPquHKgtIwJID5E8hL4xZ2vyOJiRgV57vVsSIR:sV8oNkNNPygmVD5E+L4xKhzcFGe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BetterInstaller.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main BetterInstaller.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2204 BetterInstaller.exe 2204 BetterInstaller.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ae03c0e8f383e7331903560e9d32fc
SHA1ffd389404c687ff51ca61a94b912b7f60b0ee32e
SHA2564e24744512f8c048dcd419de37475857c8f911923c44ee82a4d7d10d3f6b3726
SHA5124d82fb98d9c22b3431158888c2ad61a6d96b17888d6f1784a13121ed28215a2b8df9daff3979208584d70ef1425de8017cd52d46dfe78078e26b667ec983e0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58667cf13ba867a656b76609c6c7aea41
SHA187a7b507a093f55ee79a392f24a14652a5aefc80
SHA256f5b9ca1750cee7dfbecd7a648376e39d0f818e6b61f8aa92037b351e0cc16ecc
SHA512e6220107122317a8e7737f3a5617d9d45793931668696bb5f519b1013b8faf8e44b5e343175e34dd7c405e28cd73649827b6054946d829ee3174606442bb4070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510682dc97879fe9228416368191bd131
SHA1ae7d2cc0a4c4f0874404225d67b5ab0c61c299ce
SHA25677171a7b88c2f81c0a52e24e14ee8bd2633c5c3b9a6c8e55611d8730c762c191
SHA512070d8719e1d8636bc78fb851680c0b85bc4db92d1b1796f9c6ee0af18699ca22fc43cd7986f827566f2dcc4d194de2314c1ca9d40eb9434ebf782b27782cf03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513049e60c1418a6e22d4ef1e2bd232e6
SHA1b09f1f13e538d93df15eabff5a6497c363af291e
SHA256508dc923002e2e7a22be9a274179e2452b1463355e6b5e0c9979078167d289f0
SHA5122b4c23507f52b9f471ff6326308755235f9e325febabb7f42b7fa5ff6fd582821fdd9eb07c13b78c8921bfe10a88f8281720fd5d0f14bc15a0641e9571d475c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f546cc7036f9f1cc6f2e16e8b1e49206
SHA154bb38f13576190bdd9ee433734c2e9ce642621f
SHA256c683e5bfaa57ba510a187d75af9974c59b31a16ccb6cb75c916ddab343b1e721
SHA51232978be45d19aef0a1bebf7fdf013815b540c5681e8e50e24381bb255be27d276553c0f4f4bd653610358f034978c378bedc8756be351ef3b1cc4f64102c2e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c716290cf48f2b18f0f71463fc003b2e
SHA160bffe00219726042db387c7bc9bebea20717052
SHA256a2a2509fa3bfe954411b6f476e48d335fbba6f2e73d40209f4c6af10b629602b
SHA51218efe739f92b18000ee31e411969d2a8b109deea89f445ca1f6c1f445e3d50dc2bcd384915cc16b9ac0c8ebba3332e48cd00640680b7b17c50e0e5b5e22de204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56107f20f8ab631719a79eaff1e167e9d
SHA17a19c128b6cd91c3a79540281873a07a5c9da7e3
SHA256e8b1c945b3b95db0108f23dccf8bd24b525ea7b443ab328400689ed896595419
SHA51281fa35b28cc7020581370cdf8223d418a06ad7142ea2c8a3cab528ac46129dcbe4c95a0e6fdc66b2e8b3099f28eb2090ecc94366cdf2361bc69015e30ad0b137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564d965e09373f2a4daeeae4261f288ab
SHA1044ae3a73a9040c52656a72e311a97feeacf214a
SHA2564ede04cbf335d079b820c6bc29d026190fe76f25aa80f05f515ea5cf16956f02
SHA51271452847d65615ef264b3c449e36adee798337777d174fdee629b7b11ff547fb933eed9c480d423b312fa3831f21831616b3b97959d14703596bde5b1259181e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eea15cb11951d29cf46c86336111b74
SHA160bc062d82a0e06287e37766aae793a512df1d9d
SHA256ad791f02c4c578ce4a071ec97bf3f7377fb165da41cb70fba2cbb4039ebd493e
SHA5128f766e9f071196b940d219d96d59bdc971feb37d36924d16b672a7aa2b2e298bf97c5a30dc0e722cac81313c23e589c0145d0cf5c2e1b4d681c1693e36344e00
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b