Analysis

  • max time kernel
    129s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2023 18:46

General

  • Target

    6f7eca74e745e3397c484993194dae612290fe13267bea671f6b1b4fc4cd1d73.exe

  • Size

    3.7MB

  • MD5

    eff80a8ce839a54b559162738a3d935f

  • SHA1

    e9cf8395c5fc2aea10d8e9ef679d72236212acc0

  • SHA256

    6f7eca74e745e3397c484993194dae612290fe13267bea671f6b1b4fc4cd1d73

  • SHA512

    064b1642759722d5e5a092d0ae2b6754ddba7940d33a524188e5f49bb231c4ac0370a798670dde02b08a2cbda44e1ee70ff29c9a8ed090bdde7b22ce158f05de

  • SSDEEP

    49152:O0w0Mo8zpjaqDkMhwGMK2JcwTQqImB+r5u8QeKxFOJxdb4vZKV:d9xEpja9gwFK2JcwtIKdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f7eca74e745e3397c484993194dae612290fe13267bea671f6b1b4fc4cd1d73.exe
    "C:\Users\Admin\AppData\Local\Temp\6f7eca74e745e3397c484993194dae612290fe13267bea671f6b1b4fc4cd1d73.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2508

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabB8C7.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    3KB

    MD5

    ce4670e999867aaa785b1a4ec08e9224

    SHA1

    62188e47a72aff6d5cb457128cb63f98d3e8080d

    SHA256

    b4c9b85ca680c8ec6345f62adedcc8ac869c262211e2930f2147f82782965a2b

    SHA512

    e17dfe43b603b0510ed67f25a76fca399adb91c6660e0ed961ae25a02e48bb17b44d36cd439bbe60cb63cbb67f6088f19edd261f1da52d66eebd8c3c59b63e38

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    ffb3a9ad7287b0a4fba919c11a59914e

    SHA1

    044d440fc65b545673d4b0c3c75fd90a798f6ec1

    SHA256

    cfeddaca5eed8a72f38e2114c8436b97e9f79415754d799d2e1e8e028e216bae

    SHA512

    80911255124ae6b44338c3305b2b17563c09f96e36a0328d7f5f42e0d22f788ea015de03e11ad356de1705e92d1041d734245b7881c67628ce1fcacb68e473f7

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    e275932c8a4cc2666a2a9cb2e283f87c

    SHA1

    22e2b77a7d019c2beee4605c1acc8d4be96a1eb8

    SHA256

    1a7b7bd6fc2eed9480119e1f4bef2687f898fd833887142aa90a1955859a0748

    SHA512

    bde3ac9665667c1627dd58f2ceb0d9d54634c28035d222eb808ab3596ef6d3b6c0a0956d1f24ed50624bc37f025f9b3bab0c14fb68103b5e75e84736c26b2765

  • \Users\Admin\AppData\Local\Temp\ybB55B.tmp

    Filesize

    129.0MB

    MD5

    db579794312316aa1138d010287a5dd2

    SHA1

    29aa232b671ea24c281ae1e8e3f4e7620f7c2a22

    SHA256

    e5104fa04845b01df203c4fd295a2183cce1f688154ef23ed73fd7b000edcfb3

    SHA512

    d67ae84449d74b5d2426943c4debd381bbb9234f7854b55d64f05472f8de5f7933bece0084bad92ef700d87b902670d5794fcec697135b6d5c22604e6a8e687b

  • \Users\Admin\AppData\Local\Temp\ybB55B.tmp

    Filesize

    129.0MB

    MD5

    db579794312316aa1138d010287a5dd2

    SHA1

    29aa232b671ea24c281ae1e8e3f4e7620f7c2a22

    SHA256

    e5104fa04845b01df203c4fd295a2183cce1f688154ef23ed73fd7b000edcfb3

    SHA512

    d67ae84449d74b5d2426943c4debd381bbb9234f7854b55d64f05472f8de5f7933bece0084bad92ef700d87b902670d5794fcec697135b6d5c22604e6a8e687b