Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2023, 18:46

General

  • Target

    a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672.exe

  • Size

    3.6MB

  • MD5

    f842b17d9d1830fecd61570eb902def4

  • SHA1

    8df5c53b9c76a87d9a963a99a139d72bee4a8566

  • SHA256

    a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672

  • SHA512

    d680020fa741edc543badecbf288f87a19e7e65adc03c7312fff9defbd442c7e75835a42fe9475e2c8f60bb7b56dbf9216e1b50c6a773789b6aace4c4f27c7bd

  • SSDEEP

    49152:FhQ8lPzRnZp4y5C6mB0j47cUWB+r5u8QeKxFOJxdb4vZKVU:DllLRnZp4yE6md3KdzOJDb4v+U

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672.exe
    "C:\Users\Admin\AppData\Local\Temp\a3746ae2e779e887ec0769b6466f77f2b4038c0ec0c8d4633b912b67f73a0672.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3024

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab7D8A.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    6KB

    MD5

    f7ad1eaf5e43d80dc2b1423999c6a41f

    SHA1

    17a31202792c993348d8364e146a3ba98dca8863

    SHA256

    060ffbf17c37bca177d1514a394a270c4e126e0d9686ab76df9b23c9d45277e0

    SHA512

    ea80e2cb5e9b4a7cc50d72dfc887cd0309ebfb5695d8748ebb780763f0ca099db8e465cee28bbbe35d46be909fc70df02cfdaee5f86f59fdaaee0ca1bc81257f

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    6KB

    MD5

    f7ad1eaf5e43d80dc2b1423999c6a41f

    SHA1

    17a31202792c993348d8364e146a3ba98dca8863

    SHA256

    060ffbf17c37bca177d1514a394a270c4e126e0d9686ab76df9b23c9d45277e0

    SHA512

    ea80e2cb5e9b4a7cc50d72dfc887cd0309ebfb5695d8748ebb780763f0ca099db8e465cee28bbbe35d46be909fc70df02cfdaee5f86f59fdaaee0ca1bc81257f

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    60fe9dc948f822acb72369795c1a37ec

    SHA1

    a40a0d9bc5bf462a457cf02601cc786f1e2e1356

    SHA256

    d9453be6a16619e3d5610d1ed1bfc68908eeebfbbce89ac21260eaf44013f9ed

    SHA512

    bc04f1168aea389443ef086fcc18c5b72e06cd5daba6a3f3141f0a8f3f705d500651111266cb912bfa8f49b1459a705a6211243f9f5a9566904ba1389668b751

  • \Users\Admin\AppData\Local\Temp\yb781D.tmp

    Filesize

    129.0MB

    MD5

    6efc5f9a401191b705618d1b35a7c154

    SHA1

    79abf7a2a8c6ab7911133b7a1ebf34fe3e51a5e1

    SHA256

    fe62a86d18617325fd1c0ec1d9035df0c0a2cbae2078e29e3207cf95cdde3525

    SHA512

    045019e264f1ff82528b73e176686cb34f5debe40d7d5555575cd7db204f77b6529cb6ecbce6fcfe232328587b9df249b50e961e1061933610b75d74d5ad1a0c

  • \Users\Admin\AppData\Local\Temp\yb781D.tmp

    Filesize

    129.0MB

    MD5

    6efc5f9a401191b705618d1b35a7c154

    SHA1

    79abf7a2a8c6ab7911133b7a1ebf34fe3e51a5e1

    SHA256

    fe62a86d18617325fd1c0ec1d9035df0c0a2cbae2078e29e3207cf95cdde3525

    SHA512

    045019e264f1ff82528b73e176686cb34f5debe40d7d5555575cd7db204f77b6529cb6ecbce6fcfe232328587b9df249b50e961e1061933610b75d74d5ad1a0c