Analysis

  • max time kernel
    117s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2023, 04:10

General

  • Target

    adf3116bb6cfee0d76af0f4864e634e7e4de4ee178da8050b59ca1178b52a4cf.exe

  • Size

    4.2MB

  • MD5

    e8d6a19a64d9c4ac4b70fc76577063f4

  • SHA1

    2f2666f3b810ac86d3673f6564a7f8693d4b6f04

  • SHA256

    adf3116bb6cfee0d76af0f4864e634e7e4de4ee178da8050b59ca1178b52a4cf

  • SHA512

    308fb64c2d7bfa487cfdbf956fd7d40f5e9141508c8c1db46ff89b23e426b6b62283a73afde2787bc3764721c6cf501b0fab2120bf3948f393aa74ec48009dde

  • SSDEEP

    98304:1dh5q7noS9h6mvD1PfTLWKdzOJDb4v+q7:1ZqNJPLLlwN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adf3116bb6cfee0d76af0f4864e634e7e4de4ee178da8050b59ca1178b52a4cf.exe
    "C:\Users\Admin\AppData\Local\Temp\adf3116bb6cfee0d76af0f4864e634e7e4de4ee178da8050b59ca1178b52a4cf.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2100

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          1KB

          MD5

          04a94e0f3e349b6b643d2b27c6ee6337

          SHA1

          347d411735c2b53c4e6a26d5cabe8da9e555d5b2

          SHA256

          f94e2250e4e188ed871f7c2125180573956fb2a3fcb10f15d51ab9f47a959ead

          SHA512

          b3dafb6f7c5076c4df69b70be4182f36503fa5ed728535eb50ef1a9ae4888a61a56e873eb3285dce7e52bd0212704953f34cb2a008c0a0eb9ac717bf18ceeea6

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          7KB

          MD5

          88fd5fbd638ed7689134da10e39d3963

          SHA1

          40fe15ff3ae8d67f5916f2a67e27a3c07834d44f

          SHA256

          d6b6232df47796bc5a300a08fcaa09d12d7489fbd7a96f53c94d49303e4a2162

          SHA512

          758c3418bea06557758925cef81cc98ffd1d8c0a8dee595b18f76b1563a0afa7d19620c6d3407e06f33bb4efa36a9af9b3899e9b8bc2e197bb0167d9d1b2b8ea

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          b1e7005575eb7bbde5a3f66749ae2f2f

          SHA1

          7f3a4c9c7b0997ebed637ecd5e63d02f1e5ffea5

          SHA256

          14140ab26e210d7bbb993797a26513e006b1cb37096dd7f43500b4065f98a5e7

          SHA512

          cd58491d656cb4022bd3e66c0b85dce7c27dc6d77f0176224ff17197327973ea37c4408081006e41b260ce30340f474e24ee92932136e937c64a88b7a2a05fb4

        • \Users\Admin\AppData\Local\Temp\yb79B2.tmp

          Filesize

          129.8MB

          MD5

          51a534ddfddb68c31a1ba04aa86d5e6d

          SHA1

          25a12cdb763d5cde3d7cfc2717c84a9c9e99c130

          SHA256

          c54ee5e9df39d78f2cd3fd6881e420e6d56c317b1aabf869686c6c40f9981b71

          SHA512

          1f206ad90ed780f65431068da1287dd2201fc5610bda669d3eaaecae48a85d1abd995ca32a6178c7ae1190c552c1eb328f44e0c0fe9cec4099f6f2fcf69b5548

        • \Users\Admin\AppData\Local\Temp\yb79B2.tmp

          Filesize

          129.8MB

          MD5

          51a534ddfddb68c31a1ba04aa86d5e6d

          SHA1

          25a12cdb763d5cde3d7cfc2717c84a9c9e99c130

          SHA256

          c54ee5e9df39d78f2cd3fd6881e420e6d56c317b1aabf869686c6c40f9981b71

          SHA512

          1f206ad90ed780f65431068da1287dd2201fc5610bda669d3eaaecae48a85d1abd995ca32a6178c7ae1190c552c1eb328f44e0c0fe9cec4099f6f2fcf69b5548