Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2023, 05:02

General

  • Target

    0486ff2a94ad7841abbc226417838038ad79b4337d00d1afa5b648a85e444485.exe

  • Size

    4.2MB

  • MD5

    483ebe22909e2a0f494845b72953d71c

  • SHA1

    f56ac606e1d90312f638c78e91ae17b67447826f

  • SHA256

    0486ff2a94ad7841abbc226417838038ad79b4337d00d1afa5b648a85e444485

  • SHA512

    ba4f3b7256940cb134e238eefbf781e874787d3a573dfe100f6142f70b7d887f84a22d33d920a86f18941e08d750256267312d1f2b51c297de59c17a5b22d0f2

  • SSDEEP

    98304:1dh5q7noS9h6mvD1PfTLWKdzOJDb4v+q7:1ZqNJPLLlwN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0486ff2a94ad7841abbc226417838038ad79b4337d00d1afa5b648a85e444485.exe
    "C:\Users\Admin\AppData\Local\Temp\0486ff2a94ad7841abbc226417838038ad79b4337d00d1afa5b648a85e444485.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2596

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    119bec056456f7339293e2396127c70e

    SHA1

    90090475571df2f071642939847811c257699b46

    SHA256

    e31aa7d0b0602c57ed2705f92cd07164e9a54ffc5d2b86d0b8f30976ba5fb49f

    SHA512

    309ea128be74d13673fc84abc8c45e585b9a46b1be0d4423795542c84a109567f67cc22b1d4e8e7e7b4f437f91faa15fb86d858c670e7c2846c9daafbb9f75f0

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    80e30c981a4a6ef36a6d43f13382c8ed

    SHA1

    ed0775518122cd72ecf101eeaccde53152afd24f

    SHA256

    8ad3cd00e192269f39cbf801421761df9eb138052a95afccb90314f57c172c2c

    SHA512

    5eb4e98adf273e992db13dc97b852dfde6c76183189a609bdb94a5bc003c09901d701476af697000380133c6920a5c114e55ec770d3a67e284c5ff2d0277065f

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    bd4cb030ae8c6fd881cda5ce9b026ca5

    SHA1

    a58443366f60d086093fe238a2be63ad374627c9

    SHA256

    1a11dceb4a59d9bd3750d640245058e52d2c351e88d677bce0ee734c4659cfa6

    SHA512

    0e5b9c799bcea5792d498f79a867321fe5a0a8da63f3fbfe4088404d053dfe97214d8a20be8d15fa37f16ce25d4dee190bf029feecb5ab5492ca5d1894b3c3aa

  • \Users\Admin\AppData\Local\Temp\yb8537.tmp

    Filesize

    129.8MB

    MD5

    51a534ddfddb68c31a1ba04aa86d5e6d

    SHA1

    25a12cdb763d5cde3d7cfc2717c84a9c9e99c130

    SHA256

    c54ee5e9df39d78f2cd3fd6881e420e6d56c317b1aabf869686c6c40f9981b71

    SHA512

    1f206ad90ed780f65431068da1287dd2201fc5610bda669d3eaaecae48a85d1abd995ca32a6178c7ae1190c552c1eb328f44e0c0fe9cec4099f6f2fcf69b5548

  • \Users\Admin\AppData\Local\Temp\yb8537.tmp

    Filesize

    129.8MB

    MD5

    51a534ddfddb68c31a1ba04aa86d5e6d

    SHA1

    25a12cdb763d5cde3d7cfc2717c84a9c9e99c130

    SHA256

    c54ee5e9df39d78f2cd3fd6881e420e6d56c317b1aabf869686c6c40f9981b71

    SHA512

    1f206ad90ed780f65431068da1287dd2201fc5610bda669d3eaaecae48a85d1abd995ca32a6178c7ae1190c552c1eb328f44e0c0fe9cec4099f6f2fcf69b5548