Analysis

  • max time kernel
    122s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 11:27

General

  • Target

    fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f.exe

  • Size

    4.0MB

  • MD5

    c5692b22300b577ba7dba55b36a1cf19

  • SHA1

    bb30a34ca78fc93a32469ac4e5b0cf8b6dd029e8

  • SHA256

    fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f

  • SHA512

    427e9f18e119c9c11b4a54d8a1c67c64e2478d8b95f9449d6f807e923bab13a478582826ed994a668d18dd89de469cb66557517e05c2d97b1cea53c675a0a178

  • SSDEEP

    49152:o0N3IpkodZfdlTXKnB3nZd2r1CY+r5u8QeKxFOJxdb4vZKV:J3IfZfdJXKB3nZdzKdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f.exe
    "C:\Users\Admin\AppData\Local\Temp\fb841e32f5491fc4992c41a740d3cdeaef3ae6bb4d91f813968453c924d3077f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab6C9A.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    3KB

    MD5

    8f3d28f4a0deb2d7cb745971b755d41d

    SHA1

    55ce1447c6485bb4b96c2f306246889685aa2eff

    SHA256

    1e2597fb457dbb357874b6333c4962d725cad5407c27a590e2823310b6edf8e5

    SHA512

    f83fc0cd3b1700f9c020fc6838fb9340db132f2ae3f9a8175907f18eae0d0e1ca66a7e37e03f3eac10e5a8fb5b2f5cb6ac26bb808179aab987bc9665828256ae

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    947d374a16b311fbcfb748a372056c43

    SHA1

    876306cfde9809500e62fd0d8709e475cd74c49a

    SHA256

    cab55c28d441753e8d8be06645d9bee1c1077dc95b5bf623ec05c3d3ea2ed164

    SHA512

    cafb14799eb2cdefdbb34f38b73659a20541cd4236519ece3cd2bd35fa98798bb125c9fcc217e36bb7657604dc5ef984ec5d6a85e17b28a5c4ba40247fbab01d

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    73cb7bc674175771501dac3f97053e10

    SHA1

    9ec9a75e1ebd5aec86426dcd7b5089c2be1a3673

    SHA256

    e715d82e432a27a5a77414b113408acc35ceb0b178a0f327efcea47e78debc5d

    SHA512

    624d822366bcd6fcca47ef71343f290b2c4b8a746221bed796d2a4f839344c1655fd9032ee806cc50d37265aecde0d2021ffe2b9c5987868db67eb17aef20f6d

  • \Users\Admin\AppData\Local\Temp\yb693E.tmp

    Filesize

    143.3MB

    MD5

    4d774fdc773c577517eb9c82ee0e824e

    SHA1

    d69787bfa964fb095b45eb090be7a0d1cb103a39

    SHA256

    1cf5a864c92b951981333bb67c0fdb200690baabfefd10579b0da3a0a60a7571

    SHA512

    78d3be8b0499e610b056f1f3ca6853aada622426781239a1a47a348cb26a3f895ba75e986378d1f795cf2083247570e374fcd36bd2a5f9a220866b51e81afee6

  • \Users\Admin\AppData\Local\Temp\yb693E.tmp

    Filesize

    143.3MB

    MD5

    4d774fdc773c577517eb9c82ee0e824e

    SHA1

    d69787bfa964fb095b45eb090be7a0d1cb103a39

    SHA256

    1cf5a864c92b951981333bb67c0fdb200690baabfefd10579b0da3a0a60a7571

    SHA512

    78d3be8b0499e610b056f1f3ca6853aada622426781239a1a47a348cb26a3f895ba75e986378d1f795cf2083247570e374fcd36bd2a5f9a220866b51e81afee6