Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 12:37

General

  • Target

    e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe

  • Size

    4.1MB

  • MD5

    a2def4df0430b93a2fea58c95339fbf4

  • SHA1

    4d7de9891f75511cd6c136cbe78192e700e75458

  • SHA256

    e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca

  • SHA512

    398772d664b9927c70c80be0448f6a086c1e86bb3207cf9c6f437475ed380cd67e8bce32839df8bab42b39b81746826a6c1f55aacfe56a519bd484d477a6051e

  • SSDEEP

    49152:wDnaVVMzMvkMUzM3n5x9e5fPY+r5u8QeKxFOJxdb4vZKV:QaVizMvkMUg3n5xaKdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe
    "C:\Users\Admin\AppData\Local\Temp\e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2980

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab4F8A.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    3KB

    MD5

    10b3ea48fdcd35b80792e52d2902f22e

    SHA1

    707483aeca9a24c31e3b207d90bea8e55810a2fe

    SHA256

    1a08c01d3197d6b19417660b390de0f1c43198e296f67a92777f89605f771219

    SHA512

    4f5667876a009c3f8b080ef8232469ac63a4526ba74db95b0985b288813648fb7c84776a12bdfb735a334048aaa08b6b3d88873d9a596abe5accc8d2c7cc0532

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    ca064bb63847af6981d661f0b26f33e8

    SHA1

    eae6bc6b9af7e7ea5010cc9d1bd66bc3dda31722

    SHA256

    76ca8dabe85958ff946c8f2c08dc68fff97542b7d478a4ef856e0512c44ff731

    SHA512

    849c35d63f2295af60034616ef53364f744f5adc0773c44dfbc4c2bbefc02b330d24fcf5930b802dec50e03de1e8cb2f9461140608ee00f9dd8164653fc8f964

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    b46660263d7f7b986a479071c55ec18b

    SHA1

    a958594dd29043b0507a068f9ec661ec3579bdb4

    SHA256

    2018bdf6ca93a13285ba9d8a50e5354e4fc8a770ad49ed84c5c2cded4ac212db

    SHA512

    7abb7aa2beab98d7c9278328d6a20914c18da06e01b01a13b0bad753ce7b56dfaa9c7786f14882f3e536b62c6c062bac50d1402d1219b3bbdd2912dce04ef5ee

  • \Users\Admin\AppData\Local\Temp\yb4C7B.tmp

    Filesize

    130.6MB

    MD5

    b70459fb23db43385c7cf7073f8129b5

    SHA1

    f5db9921bc8827951622534c837bd7e12db73b57

    SHA256

    5197959e58d92fca68d4d4c93356dc3d0bbc518106008575beac20e58a5794fd

    SHA512

    df43458c4a5536f7f43e6be75c774928473934914a478e1d60d65ecbd3895c5cff42d2bbcbc4f810f9116d529801d11d5b93f23abb5182209f46800c604cee4d

  • \Users\Admin\AppData\Local\Temp\yb4C7B.tmp

    Filesize

    130.6MB

    MD5

    b70459fb23db43385c7cf7073f8129b5

    SHA1

    f5db9921bc8827951622534c837bd7e12db73b57

    SHA256

    5197959e58d92fca68d4d4c93356dc3d0bbc518106008575beac20e58a5794fd

    SHA512

    df43458c4a5536f7f43e6be75c774928473934914a478e1d60d65ecbd3895c5cff42d2bbcbc4f810f9116d529801d11d5b93f23abb5182209f46800c604cee4d