Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 13:14

General

  • Target

    064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exe

  • Size

    4.1MB

  • MD5

    17a4271783ed6bacd7ef4420738f046d

  • SHA1

    54ff17bd46acdc2bc9dd57f14638cbce8886603d

  • SHA256

    064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a

  • SHA512

    6b7398d27c35e305bdd2817afe72722e1a90a74de5285ec28753a2a79a214fcb2a40bbe7d6053ec95a59e0dea76e8198449767e2b1ca153ebabfc79bcc3fdea4

  • SSDEEP

    49152:fDnaVVMzMvkMUzM3n5x/Cl+OebY+r5u8QeKxFOJxdb4vZKV:LaVizMvkMUg3n5x3KdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exe
    "C:\Users\Admin\AppData\Local\Temp\064269a49c5bc8cab5eb57c14b3d48bfa911c8b5c79e4b66aae5af36d8be1b5a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1292

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab6396.tmp
    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log
    Filesize

    5KB

    MD5

    3c3e6ed4eb46a1418b33ca4ed282adf5

    SHA1

    2f4f9e2367db9d8ef4b8708a995d121f9fc5560c

    SHA256

    d968f738628f057860c76c5d1f02cf277e2918ab58bc8af373bb95467bf3493e

    SHA512

    88dd510b8b5e8b682be8bf051a4b5ae47449c5ac88636f353e97ea0a3c0158b00ef2fe37727447d2f6d93c9214cc2615cd3a0b4b9ee7242583ca34c6b27a78c4

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log
    Filesize

    1KB

    MD5

    a2a7ecc6d0dfe67678e3332ae99dbc5b

    SHA1

    711fe4050f748408bcb728d9e33974adb03be9d8

    SHA256

    11afdcd9439aaa8eee32dcc3512552fe48a32a3d88704905cd05c1399f8c38b4

    SHA512

    f52b93a68e4a5f67f3877f5dbb1036e26150e9281a0637150a1af01a1d9a6e2d2cdb34f2f3fb40a3de18c94e55276bcf56a544103bcc69c5564b86f5bb8539fd

  • C:\Users\Admin\AppData\Roaming\Yandex\ui
    Filesize

    38B

    MD5

    ad24f225996182fbc2d0e8af475a0457

    SHA1

    4d67fccf2b499441ca93cfc4b2d1c280cf0b54c1

    SHA256

    b83f06e1c8104a58daef5e2b38142ec643b714dcef335083ba1af5728e2ed574

    SHA512

    e179a0bcaca02b8ae9e4628db28ba34ed94d8f17ddafb41aeeb0da5429915c57e0830e265ec0ad440a6bcf4f1e8da3c0ab4fdc5f2f0afdf6bb1fc8a1ccdc79ef

  • \Users\Admin\AppData\Local\Temp\yb5DE8.tmp
    Filesize

    143.3MB

    MD5

    4d774fdc773c577517eb9c82ee0e824e

    SHA1

    d69787bfa964fb095b45eb090be7a0d1cb103a39

    SHA256

    1cf5a864c92b951981333bb67c0fdb200690baabfefd10579b0da3a0a60a7571

    SHA512

    78d3be8b0499e610b056f1f3ca6853aada622426781239a1a47a348cb26a3f895ba75e986378d1f795cf2083247570e374fcd36bd2a5f9a220866b51e81afee6

  • \Users\Admin\AppData\Local\Temp\yb5DE8.tmp
    Filesize

    143.3MB

    MD5

    4d774fdc773c577517eb9c82ee0e824e

    SHA1

    d69787bfa964fb095b45eb090be7a0d1cb103a39

    SHA256

    1cf5a864c92b951981333bb67c0fdb200690baabfefd10579b0da3a0a60a7571

    SHA512

    78d3be8b0499e610b056f1f3ca6853aada622426781239a1a47a348cb26a3f895ba75e986378d1f795cf2083247570e374fcd36bd2a5f9a220866b51e81afee6