Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2023 07:40

General

  • Target

    f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe

  • Size

    4.0MB

  • MD5

    f0ffdf44a4f3ea16601d0e9227369614

  • SHA1

    8e1c50208af9c594ba6caf4723ab4e1e49faa90f

  • SHA256

    f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7

  • SHA512

    2ca7bb1334538274dacdbde31d06bd4284112efe04439ccf3f2c5d9b4bddadde47c8210e5cbdbc24992c2d28224a874c8b581f1a854d8f6e8534cfe98d655022

  • SSDEEP

    49152:6ub3nCuhEBygPHQK2FWK9w8Y+r5u8QeKxFOJxdb4vZKVx:hb3CuhEcgYK2FhKdzOJDb4v+x

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe
    "C:\Users\Admin\AppData\Local\Temp\f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2412

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    8KB

    MD5

    539780816d6cd1882a01ca48d304e15a

    SHA1

    67bfd4cc827e18ac687e6db1350be39f0c8a8fe0

    SHA256

    6249341fec6389c881371cbb4f9102ee0c47dd05c038ca32571b408a7ed9db14

    SHA512

    6752267f2758719c25fc4fda6b6326f65a75ee4f898115093548a0d6186b23ca41d412ae8d4070d9979b25a36149d15ecf5f68c8faf178f6a1d4d2ce8ad69cb9

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    8dd871cc245e7fe0a4131cabf608ce27

    SHA1

    c443ca67bf5a53fedfe3be92a936ecebd7c9a262

    SHA256

    2acec38862760ebb3c85edf14a035eff1beec27a0d708926c10c4f2189a8a132

    SHA512

    7e8b7cdddf3b4135b863dbd8fe5490b71f48babf6eabb74f4f088d68d21141939bf1ab4e38aa3a902921102e539c12df65fbe494834d32149b4218b2db3431ea

  • \Users\Admin\AppData\Local\Temp\yb8EF7.tmp

    Filesize

    155.1MB

    MD5

    80be523a7c64745841a0dbb6f4ff0774

    SHA1

    142b34279ceba26203ac65a8092b1010f486fced

    SHA256

    9e321625e8c39a2d11025b52fd22296da145a76fdd38963d592523458ed70b69

    SHA512

    a30c010a3565cfa57dbf0a902b6763b27688c667e3110ad5ce13a23d41540c82b7399472df1e4a0d82603ba254a8008bb22a09370de2cda539cf33e62a8158b1

  • \Users\Admin\AppData\Local\Temp\yb8EF7.tmp

    Filesize

    155.1MB

    MD5

    80be523a7c64745841a0dbb6f4ff0774

    SHA1

    142b34279ceba26203ac65a8092b1010f486fced

    SHA256

    9e321625e8c39a2d11025b52fd22296da145a76fdd38963d592523458ed70b69

    SHA512

    a30c010a3565cfa57dbf0a902b6763b27688c667e3110ad5ce13a23d41540c82b7399472df1e4a0d82603ba254a8008bb22a09370de2cda539cf33e62a8158b1