Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 13:14
Static task
static1
Behavioral task
behavioral1
Sample
064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exe
Resource
win10v2004-20230915-en
General
-
Target
064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exe
-
Size
4.1MB
-
MD5
17a4271783ed6bacd7ef4420738f046d
-
SHA1
54ff17bd46acdc2bc9dd57f14638cbce8886603d
-
SHA256
064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a
-
SHA512
6b7398d27c35e305bdd2817afe72722e1a90a74de5285ec28753a2a79a214fcb2a40bbe7d6053ec95a59e0dea76e8198449767e2b1ca153ebabfc79bcc3fdea4
-
SSDEEP
49152:fDnaVVMzMvkMUzM3n5x/Cl+OebY+r5u8QeKxFOJxdb4vZKV:LaVizMvkMUg3n5x3KdzOJDb4v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
Processes:
064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exepid process 1292 064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exe 1292 064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exepid process 1292 064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exepid process 1292 064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exe"C:\Users\Admin\AppData\Local\Temp\064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Cab6396.tmpFilesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
5KB
MD53c3e6ed4eb46a1418b33ca4ed282adf5
SHA12f4f9e2367db9d8ef4b8708a995d121f9fc5560c
SHA256d968f738628f057860c76c5d1f02cf277e2918ab58bc8af373bb95467bf3493e
SHA51288dd510b8b5e8b682be8bf051a4b5ae47449c5ac88636f353e97ea0a3c0158b00ef2fe37727447d2f6d93c9214cc2615cd3a0b4b9ee7242583ca34c6b27a78c4
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
1KB
MD5a2a7ecc6d0dfe67678e3332ae99dbc5b
SHA1711fe4050f748408bcb728d9e33974adb03be9d8
SHA25611afdcd9439aaa8eee32dcc3512552fe48a32a3d88704905cd05c1399f8c38b4
SHA512f52b93a68e4a5f67f3877f5dbb1036e26150e9281a0637150a1af01a1d9a6e2d2cdb34f2f3fb40a3de18c94e55276bcf56a544103bcc69c5564b86f5bb8539fd
-
C:\Users\Admin\AppData\Roaming\Yandex\uiFilesize
38B
MD5ad24f225996182fbc2d0e8af475a0457
SHA14d67fccf2b499441ca93cfc4b2d1c280cf0b54c1
SHA256b83f06e1c8104a58daef5e2b38142ec643b714dcef335083ba1af5728e2ed574
SHA512e179a0bcaca02b8ae9e4628db28ba34ed94d8f17ddafb41aeeb0da5429915c57e0830e265ec0ad440a6bcf4f1e8da3c0ab4fdc5f2f0afdf6bb1fc8a1ccdc79ef
-
\Users\Admin\AppData\Local\Temp\yb5DE8.tmpFilesize
143.3MB
MD54d774fdc773c577517eb9c82ee0e824e
SHA1d69787bfa964fb095b45eb090be7a0d1cb103a39
SHA2561cf5a864c92b951981333bb67c0fdb200690baabfefd10579b0da3a0a60a7571
SHA51278d3be8b0499e610b056f1f3ca6853aada622426781239a1a47a348cb26a3f895ba75e986378d1f795cf2083247570e374fcd36bd2a5f9a220866b51e81afee6
-
\Users\Admin\AppData\Local\Temp\yb5DE8.tmpFilesize
143.3MB
MD54d774fdc773c577517eb9c82ee0e824e
SHA1d69787bfa964fb095b45eb090be7a0d1cb103a39
SHA2561cf5a864c92b951981333bb67c0fdb200690baabfefd10579b0da3a0a60a7571
SHA51278d3be8b0499e610b056f1f3ca6853aada622426781239a1a47a348cb26a3f895ba75e986378d1f795cf2083247570e374fcd36bd2a5f9a220866b51e81afee6