Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27/08/2023, 21:45

General

  • Target

    e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b.exe

  • Size

    3.7MB

  • MD5

    d39082eaf49cce30525092a3b9111902

  • SHA1

    f706cfd6dacf573bbe5b8eaf39cef5c85875b397

  • SHA256

    e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b

  • SHA512

    2df0a0452d64c9ea75cac9cc597224f2c94306f8dff6d0eb488f85b20c078f83ce73af6fdc3159be063e5145647e342fa18dfc9b924315e476122e10d3fb9af2

  • SSDEEP

    49152:X0w0Mo8zpjaqDkMhwGMK2JcwTQqzfS6B+r5u8QeKxFOJxdb4vZKV:E9xEpja9gwFK2JcwtKKdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b.exe
    "C:\Users\Admin\AppData\Local\Temp\e42355d55c7ed240c1238ba7a77f95b6110749dffffe53c4a05b95eaa9f1370b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab8077.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    29c73cc4ebc819fb7a137e3e9cd23ee1

    SHA1

    06926672a876f30032a1f90fcba45be4edfad2f3

    SHA256

    b08a95efc7b940cd673f5722f68b8320a18742b8d5ce2549231eed66c6322ff6

    SHA512

    8c14ec6389e896b45449a45537095a10958e6876532f95f8aac5b3fe312dd7d5cde425d70f2871f8b54dd8109916370f38f3effe79a166149cb8aab9a95d3207

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    bdcbf52c202fb20277c3098454dc7200

    SHA1

    578023a7a562a5561224c6f39e7f0f77d6caec88

    SHA256

    9c548d8cc4f9fea74d96c7dcec3a1fbc13612b4e4f6eee05dd35ee1c0f216f9c

    SHA512

    91e51c6a169707a3d44646e8b67026ef8dc6a1455c2108ae018f176aa06af903b4a61097343d8080b63f1c20518e5a7b7fa7a631c6cbc71870edd3e2f9fcdfec

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    a26e179dc356fc17d25d5fc683618904

    SHA1

    359d270ceeb4b2e0a43b111ab5641cd4165fa9a7

    SHA256

    17f7c620fb46176e86d7eba33fa4ac2c7763d94948ec0b9a06b77248a90014dc

    SHA512

    75acc73eb77d1eb4d849d2b61374231102604b845ece4f43ad3f2915cddbe7024d2c3b75bcf094d9f335e72cd7e4233064c306bd9681c79a479988edacdf0e7a

  • \Users\Admin\AppData\Local\Temp\yb7D0C.tmp

    Filesize

    143.3MB

    MD5

    4d774fdc773c577517eb9c82ee0e824e

    SHA1

    d69787bfa964fb095b45eb090be7a0d1cb103a39

    SHA256

    1cf5a864c92b951981333bb67c0fdb200690baabfefd10579b0da3a0a60a7571

    SHA512

    78d3be8b0499e610b056f1f3ca6853aada622426781239a1a47a348cb26a3f895ba75e986378d1f795cf2083247570e374fcd36bd2a5f9a220866b51e81afee6

  • \Users\Admin\AppData\Local\Temp\yb7D0C.tmp

    Filesize

    143.3MB

    MD5

    4d774fdc773c577517eb9c82ee0e824e

    SHA1

    d69787bfa964fb095b45eb090be7a0d1cb103a39

    SHA256

    1cf5a864c92b951981333bb67c0fdb200690baabfefd10579b0da3a0a60a7571

    SHA512

    78d3be8b0499e610b056f1f3ca6853aada622426781239a1a47a348cb26a3f895ba75e986378d1f795cf2083247570e374fcd36bd2a5f9a220866b51e81afee6