Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2023 15:37

General

  • Target

    47f372c41daaf7bae9a1169eec9b26514f016ea6132ae1f2feb23094bea1e920.exe

  • Size

    4.4MB

  • MD5

    8cc69f9f6d522c306acdced8a84d2300

  • SHA1

    bacd2ca709fcf5a5d1262ddab4427c61af7f77c0

  • SHA256

    47f372c41daaf7bae9a1169eec9b26514f016ea6132ae1f2feb23094bea1e920

  • SHA512

    7106a407c9517304366418546b5e1794a4172b8f9be20ab51365b0971f6423dc47cae1b2146a78d974656d72f7504fb46e495ab7dfa63a6dea6b34ea6a20b6d1

  • SSDEEP

    98304:F95xjBWDLaMaG0Or4sniiqG92KdzOJDb4v+g:TfWEOmiq4wN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47f372c41daaf7bae9a1169eec9b26514f016ea6132ae1f2feb23094bea1e920.exe
    "C:\Users\Admin\AppData\Local\Temp\47f372c41daaf7bae9a1169eec9b26514f016ea6132ae1f2feb23094bea1e920.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1576

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    baa10f812c1e81b0658f61290620d318

    SHA1

    1d841491ba43667ab8fc458cd4a2c1f554e2dda2

    SHA256

    c9819ae3830906929c2255364b2c28e5ba3964250279885fc5cfa117be48764f

    SHA512

    50843d81d345941621d7a9ac5f03173aeb347a53b0fa4f584f43029d4002a71ddbfed73df5e5e817ccd6ab9e0914e3b75c48cdd8ec27d7155f414cad7c8c45ae

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    9KB

    MD5

    92ffe463c27f7c5753f302276818078d

    SHA1

    2589961e55278586a997a46252065a5f37ee38ea

    SHA256

    a0cf86109b3b571f1a0ee037a8ff7b834973caaab70c86c15a2ea73a88ca340b

    SHA512

    c783629ddcecec4d495dc84eba109412454fac5e0f119af3518f6056bbfe6227d74d070771eed705d6e0daa1b112ab6afa776698276da2846be6f56cc9a72f90

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    ec667d6c2f1be6e9744a9a33ad04d6d4

    SHA1

    422afbc1304cab963130ed8418d0ab12096df2ba

    SHA256

    dff5c9d00df49ca057273e124faac6b280bf08b5c474b36fc9b8728a0b8afeea

    SHA512

    b7cee6d4149f54583976ad3eb71c59d38f2bf6b8683f686c78a53f5b9f5da62d95645154d1665399ac209cb5680082d10f589cb90e1eccf6396db9299eae231a

  • \Users\Admin\AppData\Local\Temp\yb7C03.tmp

    Filesize

    132.5MB

    MD5

    1ce2fe084095991c36f6b0fef4db5084

    SHA1

    271960fb20c9d48f2794dc472d5333869845177b

    SHA256

    31340c7e1034f633a169ca5b5ea57309af4f641508e582f0889f493cdc1fcd01

    SHA512

    db07fb508a841cfd1ec52f23e27d16ff97062d2267d109c9f3f3225f9530aea514916f46199300b67bbc1132a575036a1c5ab33009afff01001cd5e8cf9494e1

  • \Users\Admin\AppData\Local\Temp\yb7C03.tmp

    Filesize

    132.5MB

    MD5

    1ce2fe084095991c36f6b0fef4db5084

    SHA1

    271960fb20c9d48f2794dc472d5333869845177b

    SHA256

    31340c7e1034f633a169ca5b5ea57309af4f641508e582f0889f493cdc1fcd01

    SHA512

    db07fb508a841cfd1ec52f23e27d16ff97062d2267d109c9f3f3225f9530aea514916f46199300b67bbc1132a575036a1c5ab33009afff01001cd5e8cf9494e1