Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 17:01

General

  • Target

    15f31d711b241726c44744ac8702dfc6d4dcb494b877849305ac125110ad43cd.exe

  • Size

    4.6MB

  • MD5

    e6403aab8b76a99b10b7dd582c974958

  • SHA1

    a3282822bbdbdbca2e8d28801236474b27bed85f

  • SHA256

    15f31d711b241726c44744ac8702dfc6d4dcb494b877849305ac125110ad43cd

  • SHA512

    82950ad007b4e41694c94f982190116197bf7673f0e8e5f37208156f37495f84eb29e0563b1eca8faeec6e0cb2eca6e86f12767573dfe930f2c9ebb2f16464b1

  • SSDEEP

    98304:IG1c5g+Wm3n0tzGoFrnoNspKdzOJDb4v+:UgjGoFrn4wN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15f31d711b241726c44744ac8702dfc6d4dcb494b877849305ac125110ad43cd.exe
    "C:\Users\Admin\AppData\Local\Temp\15f31d711b241726c44744ac8702dfc6d4dcb494b877849305ac125110ad43cd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2420

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    234de19d68f9e336d27161032bf7130a

    SHA1

    3584ae29407cba6fce9b3bec307a2e4ff812fa60

    SHA256

    26e51cd15e3477cd8ef0620340aacc871ac63c0f0520c1aaca41428380dcc9e8

    SHA512

    96ae0647912bcc94683d061bf03ab820377443f024dd7c105ec5eefa45bc9cf83429919fdfd3037d0a6bbc262a548f9fbb4cafe6f14fdacc9bbdc8dc1545d2a2

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    d118b10a4b8f63b799261131566da258

    SHA1

    e8de765dc3d85395acea999e9fa49fdf960bc13b

    SHA256

    d9578e7770dd4ca51ece6fb64a725b76f612c627a1c8b511f32d9cc23e787819

    SHA512

    6e8b112ec8dc1e5a4355263ae61929c9086cf3183d5416fd41bc33dff8ce391484a1fecdf3701ad5a98f8ff3558fb094bcc6828b15c26169f219e423306f3d9f

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    143548a50436d3cfdb5fbe7fbddaa1b8

    SHA1

    a8064fe49d48326eac4e349c50fa4f47e535f8af

    SHA256

    6a5db45e21bef73f3e9d9c281e2605c1492b70fd9f0f8353f195642cf082fd02

    SHA512

    ac9035ba6487f5b29ba9a17198a22da6be0be7e99f4617e4755a17c3a14ed807fda3622e092d117db80d36f4b9ebbcc5f881b61e2643f2b62daa3732ae4981a2

  • \Users\Admin\AppData\Local\Temp\yb32C4.tmp

    Filesize

    140.4MB

    MD5

    4cb143fdad968165c2dbe48ba8950bb1

    SHA1

    cb0faa0650fba759a596663382cc6692dd8a727a

    SHA256

    4daab0bcf0af280b939c6b52df6d7b98bdad5d062b65fc4318e44f948f43103c

    SHA512

    a6613467737f9ad3a554a97e71053451eac5ba966550708b77b4b1ae1a0c1aab1845ff94563701a1ff1cad27cfef59d8f733838871d139c4599ae72a104ea821

  • \Users\Admin\AppData\Local\Temp\yb32C4.tmp

    Filesize

    140.4MB

    MD5

    4cb143fdad968165c2dbe48ba8950bb1

    SHA1

    cb0faa0650fba759a596663382cc6692dd8a727a

    SHA256

    4daab0bcf0af280b939c6b52df6d7b98bdad5d062b65fc4318e44f948f43103c

    SHA512

    a6613467737f9ad3a554a97e71053451eac5ba966550708b77b4b1ae1a0c1aab1845ff94563701a1ff1cad27cfef59d8f733838871d139c4599ae72a104ea821