Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2023 15:30

General

  • Target

    6087c1e3b0891b081ac7b7a9eb50a54309539b194c8040a767f57cf5872a8c8a.exe

  • Size

    4.6MB

  • MD5

    87d764d9c7de798c6ffa20b92583ab28

  • SHA1

    1dac46a603381e68cf4e24e4263955660f91acf3

  • SHA256

    6087c1e3b0891b081ac7b7a9eb50a54309539b194c8040a767f57cf5872a8c8a

  • SHA512

    b0f075561fbe142fa69b2a1b7016be09dce466c30a56b992f7c25da04d9f1405b6e2a7c0b5561f5932117dfa011d0569a3f4da463b0742d97cab12469e13202e

  • SSDEEP

    98304:p4TjVBOWLl3ncPQEF4vClRJKdzOJDb4v+:cBOwEF4vBwN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6087c1e3b0891b081ac7b7a9eb50a54309539b194c8040a767f57cf5872a8c8a.exe
    "C:\Users\Admin\AppData\Local\Temp\6087c1e3b0891b081ac7b7a9eb50a54309539b194c8040a767f57cf5872a8c8a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    3KB

    MD5

    0e71771ffe52460f56fc6b5742e57290

    SHA1

    e6d14119d206ed2107756c604c4621b557def366

    SHA256

    5ef6a13cd24b9b1c8e8684dd61c4cd1a2ef8ed188e12854f08025318d08c859f

    SHA512

    ac2ef7764188ae77c1dc724ab1293f63a7c590994a73ed6426c30205d95fb33110fda6836d0631a04ab108ea09c8fb63565a696b184953bfcc2fc81ec372f453

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    60c8023bfcabe0891d4dc65285d57030

    SHA1

    19537ebea2c7bad8e2b5da1854c7a6d5fdf9a1b6

    SHA256

    2cfd4eda3da9791879e43a5abc674e0a075c065f5c2e1ddf32af3b4689f2d37b

    SHA512

    556b45c56ce439604a3cf52d57d4001a6c6c526b9cf2233cdb26494b077f58541c38a0a4169c69811ccc5eb23c51e86cedb9efcae7709ee2cbe70e1480dce908

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    c7c35349c9b37317e9cd082abd801b72

    SHA1

    7492875f8489347760437f72dc5e79c37a630f59

    SHA256

    0d36c359409a740134aec3b5c86c6688d2a79e2411f5f210d88e7191c3535dec

    SHA512

    a1716c8842e3c00d2b12d38a6aaa17a26b108cec96ab24fdd9121fbe3dd941b5657abcb7993ff8b88ecba8b2e2358c19243f869504cb2deab9d09d69fcffe829

  • \Users\Admin\AppData\Local\Temp\yb3350.tmp

    Filesize

    154.6MB

    MD5

    cafd1e472d9f2eb5bde2d3244df90da6

    SHA1

    c188b51690f9d4119db9da270cbb9d98850a697e

    SHA256

    ef876bc431d575ec6e11e9aed0388cfd0f261bd5a8b7b4894cd3312123e9e69d

    SHA512

    2505366a92c24cbad8688caf7cc10d3ed1143ac154da126c2053472c437c14a456b97b3a71a87f24836a27a66ca894e7093610b40af609da34054f0066bf027b

  • \Users\Admin\AppData\Local\Temp\yb3350.tmp

    Filesize

    154.6MB

    MD5

    cafd1e472d9f2eb5bde2d3244df90da6

    SHA1

    c188b51690f9d4119db9da270cbb9d98850a697e

    SHA256

    ef876bc431d575ec6e11e9aed0388cfd0f261bd5a8b7b4894cd3312123e9e69d

    SHA512

    2505366a92c24cbad8688caf7cc10d3ed1143ac154da126c2053472c437c14a456b97b3a71a87f24836a27a66ca894e7093610b40af609da34054f0066bf027b