Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    24/10/2023, 14:32

General

  • Target

    67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0.exe

  • Size

    4.8MB

  • MD5

    cb40b51c30ff365d1247dac437aed0b8

  • SHA1

    f16d8454ec703ea01acb0fc10c2dbf8ab263f86d

  • SHA256

    67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0

  • SHA512

    9605c806c605a91efc33188485d7d7ff938a0955b350a436972190efbf370aaff4fde6031a19dc825f14ee1d666adc4a10e72fcde79fba44a18f064982cd60ff

  • SSDEEP

    98304:7TVlYQiFIUueAAu2PkcCO3LUKdzOJDb4v+es:NlY02PkcFwN0v+es

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0.exe
    "C:\Users\Admin\AppData\Local\Temp\67f7f30df104041392cb51eabf0570d3511bacce173a88a2a1ced61bb947c0a0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1408

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    9KB

    MD5

    99a82ffa4b1035038b767841ca378729

    SHA1

    e095724f1bc0ace12dd712448b4b7ee3901b825a

    SHA256

    bbc73a6f94b736a68dd06b25d1f2678a429d1cc2ed6d87aaa35863c8c92621ec

    SHA512

    b0f7ef40eea3d12c19616ee92ad204bc787d909b70c97ffb97812b7332dbe8280afeaaeb37e903f49aea7c236ee11a973a6e57d90d75018523b6928f802c437e

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    94e6948c6b3b1e3b2b08d28ae79b70c6

    SHA1

    47265816b80e46e59c116b8e1f02a598672a96e7

    SHA256

    f030d699c0a3aca8e1669803a2159ff45073cb4ff1c03f3ff0f7f39740316b57

    SHA512

    39b7c0faa8232385ad6ec874e1deb611a369db3517faf45c66fd4e7029217c076c8ccba020e8cc5678c89bfab7541ae6148bb779d86c0fe421a18a4d9f51ee7e

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    aa166c58a6c4872a056b516ec05597db

    SHA1

    f7be59a3f6aae1ac15baeb23b90c5df500f6c6f6

    SHA256

    48d854aaa0c415f51538edadd03dbeee829aef429a741a63134dbb7a50c468ae

    SHA512

    8ea982c89df8fed5e9c5b3e6cda73e79a0856fe37092fa89f1878938a97e175e5bb13d1f7233e3578561270e7b13573cb67b28f513cda6d5740d29b4fe4419aa

  • \Users\Admin\AppData\Local\Temp\yb9E13.tmp

    Filesize

    140.7MB

    MD5

    433c875775a97c39b365939bfebec2e9

    SHA1

    602d0c9bf071cfdaa4da02a27f1ca58aba83496f

    SHA256

    28a418009abe73726a188a13006b30283795eb7f55588ec8b37d51d3a977ceb0

    SHA512

    3baef936a357eaddef3264e4487cdf881237204febaeaa582d3d5dff57ee96af403bf1c24d4344a3a740cde5a348472779fc1ead37892f05efb7972c33cecd05

  • \Users\Admin\AppData\Local\Temp\yb9E13.tmp

    Filesize

    140.7MB

    MD5

    433c875775a97c39b365939bfebec2e9

    SHA1

    602d0c9bf071cfdaa4da02a27f1ca58aba83496f

    SHA256

    28a418009abe73726a188a13006b30283795eb7f55588ec8b37d51d3a977ceb0

    SHA512

    3baef936a357eaddef3264e4487cdf881237204febaeaa582d3d5dff57ee96af403bf1c24d4344a3a740cde5a348472779fc1ead37892f05efb7972c33cecd05