Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27-08-2023 11:37

General

  • Target

    f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a.exe

  • Size

    3.7MB

  • MD5

    32ae130aed63411732a111a66146cdb4

  • SHA1

    e011404f27ae8be6585eaf8f9404cf53d86c70af

  • SHA256

    f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a

  • SHA512

    f77d2842844796b98b9de2c945d5817400a966cf81cc49886eedd1fee6052dce65bc642717540986f978be1d0b307706cd4941262398193d3f3d567516aca812

  • SSDEEP

    49152:u0w0Mo8zpjaqDkMhwGMK2JcwTQqz5SzB+r5u8QeKxFOJxdb4vZKV:99xEpja9gwFK2Jcwt9KdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a.exe
    "C:\Users\Admin\AppData\Local\Temp\f54ca77efd62c559975b8e2344cf8464da820c2488da1a2766811b7cf8909d2a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2344

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab8836.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    cbc6cf04227dd62e074fa0e5dc1bc2ba

    SHA1

    53fa64f428a164643a9494df54aeb90ffc769f2e

    SHA256

    10706ef40ff65cccea6adf47fa3929f46df57411c601e76af4c298f9240b0024

    SHA512

    e6e9d51256c83fea99065531d8946d5ebe083ccbd3bbe3bde190c8f41a20d6bb7bac33f79c681b90ffa559e4ea24c396088a63dcf43d21e8d115669eb2d429d3

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    2ed8f7feeea30eca2f9d11ed78ce2e03

    SHA1

    78dc5a313ead8c1bd5116fd1889e7a1cc4391e63

    SHA256

    23650a728ba214d76cde3e97b2cc1c2ea724bfcc590c7c9def4d2c5fa5e40ed3

    SHA512

    72d135f731768b7118bf7edb52b49767f4ca6b8e614510a76d26efd3a6909896303905163328fae9f2755399959d6e3e45fa5fad9f8904a4293e39237d5fd77a

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    2a18ec1b81a8f9e9675a3eea34e5a4f0

    SHA1

    e9034d010864b6c5d80800fe50030f14e4c1be66

    SHA256

    c8ff929766a144a91baf2ba9f7ee432cf28781a9ed7de53b8aba14ed243713cf

    SHA512

    52818a59473f4a581a7bc4055ef7f3c2b0f7dc2c994deefd91a56b1ac944904e9150f9565a3a71755fd4f32d4059b5e1d2fb44d6511b5e7029f39870b24041e7

  • \Users\Admin\AppData\Local\Temp\yb841E.tmp

    Filesize

    129.0MB

    MD5

    6efc5f9a401191b705618d1b35a7c154

    SHA1

    79abf7a2a8c6ab7911133b7a1ebf34fe3e51a5e1

    SHA256

    fe62a86d18617325fd1c0ec1d9035df0c0a2cbae2078e29e3207cf95cdde3525

    SHA512

    045019e264f1ff82528b73e176686cb34f5debe40d7d5555575cd7db204f77b6529cb6ecbce6fcfe232328587b9df249b50e961e1061933610b75d74d5ad1a0c

  • \Users\Admin\AppData\Local\Temp\yb841E.tmp

    Filesize

    129.0MB

    MD5

    6efc5f9a401191b705618d1b35a7c154

    SHA1

    79abf7a2a8c6ab7911133b7a1ebf34fe3e51a5e1

    SHA256

    fe62a86d18617325fd1c0ec1d9035df0c0a2cbae2078e29e3207cf95cdde3525

    SHA512

    045019e264f1ff82528b73e176686cb34f5debe40d7d5555575cd7db204f77b6529cb6ecbce6fcfe232328587b9df249b50e961e1061933610b75d74d5ad1a0c