Analysis

  • max time kernel
    136s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2023 09:02

General

  • Target

    4ccc94762a9735144474699b1ba0888c4b5ff67effd1fe944792e53365484807.exe

  • Size

    4.6MB

  • MD5

    f2de2a300498a0469dce974341e8876e

  • SHA1

    a960239433161a8309711e680f529ca146c5f7f3

  • SHA256

    4ccc94762a9735144474699b1ba0888c4b5ff67effd1fe944792e53365484807

  • SHA512

    6a3f0d1f93c62afcd1d375e7d54bc398c23ada4036d5cfe4fa4445463da7b13bd68c625299cd1dcfaa69e98f3183c1fb5d5f6334d479b9aa9fa22765465f5ac9

  • SSDEEP

    98304:6aVizMvkMUg3n5xmtDasmlKdzOJDb4v+:+MsR39wN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ccc94762a9735144474699b1ba0888c4b5ff67effd1fe944792e53365484807.exe
    "C:\Users\Admin\AppData\Local\Temp\4ccc94762a9735144474699b1ba0888c4b5ff67effd1fe944792e53365484807.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    29a1612998095d8a008040e8bba3a38b

    SHA1

    a934754d37c12a58ff667f847349177efbf19f78

    SHA256

    a149e24bd56b0fe4072d6ac5b7bf8839ce8ad0a7969e160243b5e09ca4538461

    SHA512

    e232007462edfeb5cca92dba16ea1c48f2bfb5fd57ffbe2498e3c8d0ca7c4379bb01c4d18eaf61e764999c490143a74be49658fdeb6eab9609c743280d9825d5

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    5KB

    MD5

    9226916f790ded2d2d04b8adde6197b6

    SHA1

    0279790b9c2f7cf5f0a7c3a02412d5653f3ecc2d

    SHA256

    3361d5a0c06700c2c055f9648e0aaf439a6f30f353cbf0e083e3df5d6908c256

    SHA512

    321758c8b9e9e272924bc7edc76c0cb55c8b6f514ef5f31cf486ba9f96cb806aeb923a39a063405ac7d1f84c0df8b14a426bd99a1f99ea484cd9edd38fcdb5a6

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    c5c5e19a0f0ec8cdcae7d6e13be5b6c2

    SHA1

    bcdee34f939d3020409abc66427cef054def9b85

    SHA256

    e8fc0e16e9672bd33f5882836d8050ebe751b16349a93abe088da32eb007fb70

    SHA512

    5ec9d29f404b5b5585e347effd2a7359bd9a76f8d2fecfa289d64c7903d88781ef92157bb5b3e6938f480f48ca28844f8aea940b8d163721ab37cfdbf2ba0481

  • \Users\Admin\AppData\Local\Temp\yb1574.tmp

    Filesize

    104.9MB

    MD5

    9b4437215ce6adc349162dae3fdf3ea1

    SHA1

    69129211db3a7141086f3665242ee88d3121458e

    SHA256

    f9de1fa5163162297012e1b0c8a566d16a3ce8630120942b21beabad2b493601

    SHA512

    544c8c5ea5204d51833444d0e9688460d0846dfb1373377021f41cf0cc0f9115024d1c532e92d6018a2fafb9b40303e02c97ebb187534e9a6ec6c4c522c069b2

  • \Users\Admin\AppData\Local\Temp\yb1574.tmp

    Filesize

    102.9MB

    MD5

    a702caf2165a376ee4bf5c8a9f0749d5

    SHA1

    88b43ce15dd5e59252d1306d100ec41db17a6859

    SHA256

    4f698281aefd51484167c49e39b6ace44792287cd7ad5f56b5c94096206bfbd2

    SHA512

    a3412e09502fa94bfb972ed2be27668f28a02026d545fdf83b4c056235b7b3cebc731e7da8fdbffc5f639a974e410e88ac09e9f7c7800573468c81b0bb3cfca7