Analysis

  • max time kernel
    162s
  • max time network
    216s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 06:15

General

  • Target

    27f474815e8e7c7088b7e10457c156894402d236ae944aa3aab7c76c24025f15.exe

  • Size

    2.3MB

  • MD5

    84873cbefbbcd1996edec7cdcce702cc

  • SHA1

    8eae857a88293d3275cb26a537f16d567e811972

  • SHA256

    27f474815e8e7c7088b7e10457c156894402d236ae944aa3aab7c76c24025f15

  • SHA512

    f7d1b78950a5130ce4c9c4cd32d662cc75652c4973aaf78778a8bb972ecb1226906166fcd6fd41c73e300dd5e65f3bb94d4ff0eb16015b764698515248d9c77c

  • SSDEEP

    49152:x4DE5KoEdy87AfT4COFCeBqP+r5u8QeM2d:0tdy87Af8COFnxKj

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27f474815e8e7c7088b7e10457c156894402d236ae944aa3aab7c76c24025f15.exe
    "C:\Users\Admin\AppData\Local\Temp\27f474815e8e7c7088b7e10457c156894402d236ae944aa3aab7c76c24025f15.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2828

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab9927.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    f6391ced6a8964716cef0b11ceb14028

    SHA1

    07956506a47549789c29d0ed4bc848c756a3aff0

    SHA256

    7fcf76f490c9a87f2e487553f4233c0786cb6a57ba30015a429044213eec009e

    SHA512

    b0ddbc4ad316d3c6dacdc4fc818587a753e06d030221573c7fbf598d77f8312ff6ad0a4fdc495bf5e1e2cef0dddfcdd773b9f56b10f0cfa517f6020ca3740df9

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    3650db6173e7de871e4335de0db0dd54

    SHA1

    2f41a1ab302426d60fa40b97a4538c4c595f6941

    SHA256

    50a534af9db54707255468cc8e5e112e41e2759925969fd6e07e5a0dbe5115e8

    SHA512

    051c66cfb41388255d337499db970e806e8315cd1c8991b43a02293d3f00475c8e15707b4f8b99cdeab7935ebad22f9e187f2dbb68895b720baab5f2cb9d963f

  • \Users\Admin\AppData\Local\Temp\yb95F9.tmp

    Filesize

    143.1MB

    MD5

    036b2f7390449bf5e629e6b971341322

    SHA1

    e18a2c46baafa9d42a976e4e7113bb6674cfb5d3

    SHA256

    37bd0d324c8b6d88c2ceb9d134af62d8142bab4189402767429e325801bc79dd

    SHA512

    75639c212f834d6c7a527706e9567ceea4e00dd080f21bc97cfd5e9e7ae7fff097c47f653023db50eb550779f3f8ce069fb4df7435780b58493cc75fb0fc8887

  • \Users\Admin\AppData\Local\Temp\yb95F9.tmp

    Filesize

    143.1MB

    MD5

    036b2f7390449bf5e629e6b971341322

    SHA1

    e18a2c46baafa9d42a976e4e7113bb6674cfb5d3

    SHA256

    37bd0d324c8b6d88c2ceb9d134af62d8142bab4189402767429e325801bc79dd

    SHA512

    75639c212f834d6c7a527706e9567ceea4e00dd080f21bc97cfd5e9e7ae7fff097c47f653023db50eb550779f3f8ce069fb4df7435780b58493cc75fb0fc8887