Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2023 20:37

General

  • Target

    b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9.exe

  • Size

    4.0MB

  • MD5

    e4c4088deab47dc7131bde76201b0b0d

  • SHA1

    9b920dbcadc884752a07c64c89231da92527ba72

  • SHA256

    b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9

  • SHA512

    8e382a44d92955123477a7bc8a705de423b15c3b20c5737cdd8a4c04c731374b7e6c94faccc1f21409dc96f2f330e05d1f10f885b51e6e6057b823f679f13138

  • SSDEEP

    49152:3ub3nCuhEBygPHQK2FPzhhe3Y+r5u8QeKxFOJxdb4vZKVU:+b3CuhEcgYK2FoKdzOJDb4v+U

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9.exe
    "C:\Users\Admin\AppData\Local\Temp\b47c41fb61ff4b372756d2e621bdc9bcd0b8114fc0d22daa945203cb4055b2a9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2412

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    a8ef9703d55d1c299e0cb2ce5cef8d38

    SHA1

    41c5432651214415643611b49e520fb65e6c2044

    SHA256

    646d24dd8d1861460fcb06f78daa9da3f399f4f6e8134a44c926df45529721c2

    SHA512

    3fac326a520797d1ea294861eb2802ab7ba41cc5e27b9ce2ec226a442c2480f189e1c7a3bce3b3493e64ade1e117496d6967000127afe4029d4a8e3779546c12

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    cdc2dd03792fee36bf5acaae09b05322

    SHA1

    ba1b4d6ee456f017b26ef510391248fd659ef47b

    SHA256

    2352c2f11aebc94531d8459b05f721e4ca02f7843db0d436c2fb299e54b9b78b

    SHA512

    ab5eb5c1e37e2bb5260c94bb8780932fa1c81fa630350d600c7975bdcedde9bb7836408f99b01381fe333ba843a565d8f2f307b85258c98ed6c34bc01674b995

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    2216b865a0d6039c6de430d10929cdfa

    SHA1

    eb4b041a0d3dbbe3751358b2f98d34bbc4575bb1

    SHA256

    26678e6f26a3c2ce6721f941d253f619e4fe0028d36af2eeabfc3608111a5c89

    SHA512

    6852ed8434a7f9e379b7288f71a75abf88e97807a1f3e782331f775be0323d4ef2893629d770d012b6ca772fecca57df0d829a1668268eed02e8b80512cbb1a9

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    ebbdcdc42f3ac4b1f4c90da78d7993fd

    SHA1

    78923577eb261ab622265347c22b8a82fbb87e27

    SHA256

    e479bc8762c49e54299fd9696cd6486febd269deba037ff5825347c4f036e9a4

    SHA512

    cd990ceaca2694500fb0081f37fbe3ace86a6574ddb2d2581819816f41c3e3892476d88860d32e9115edf0adf11d5a3993ba6dad4de4a063cbef8a2d6d67c01e

  • \Users\Admin\AppData\Local\Temp\yb956C.tmp

    Filesize

    155.1MB

    MD5

    3469020b81ad87c33bd9e36b3e3e6ba8

    SHA1

    008a1622d92eba3c935a8a068e7125e1c2fdd3c6

    SHA256

    8b3569d4f33acdee3884afe9ec30d6a91bacfafacf7f324371cfbc4fcaad1933

    SHA512

    c892acdde8b6b7269144702a6ae12f27d4c637cad4d6eff9dbdeba6f9ed656220922b088901daa835b7718e998623552d5d8af38a19e4322bbc07fb9af1d9ed9

  • \Users\Admin\AppData\Local\Temp\yb956C.tmp

    Filesize

    155.1MB

    MD5

    3469020b81ad87c33bd9e36b3e3e6ba8

    SHA1

    008a1622d92eba3c935a8a068e7125e1c2fdd3c6

    SHA256

    8b3569d4f33acdee3884afe9ec30d6a91bacfafacf7f324371cfbc4fcaad1933

    SHA512

    c892acdde8b6b7269144702a6ae12f27d4c637cad4d6eff9dbdeba6f9ed656220922b088901daa835b7718e998623552d5d8af38a19e4322bbc07fb9af1d9ed9