Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2023, 21:01

General

  • Target

    52a0afcfa99c5f1d4ee1ec4c2475177d130612e62158cde22b2536d055d3921b.exe

  • Size

    4.7MB

  • MD5

    f0e493d2980185c7a90abcc8dcf5f858

  • SHA1

    63cecbe2e8017ad0415d47cff11f4782da815950

  • SHA256

    52a0afcfa99c5f1d4ee1ec4c2475177d130612e62158cde22b2536d055d3921b

  • SHA512

    cfefac7702626def468fb51dcb5511d3b0ac91acd239b8469aa45f0c4088afe068d255ff92cba737e7cef5ce56ac7cbc297f47ab6d915ecf56614fef1abc175a

  • SSDEEP

    49152:xb2XfWHdZ8BhE7K2dM3Jqfmc2jRAjY+r5u8QeKxFOJxdb4vZKVI:12XeHdZChmK2d7eRR+KdzOJDb4v+I

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52a0afcfa99c5f1d4ee1ec4c2475177d130612e62158cde22b2536d055d3921b.exe
    "C:\Users\Admin\AppData\Local\Temp\52a0afcfa99c5f1d4ee1ec4c2475177d130612e62158cde22b2536d055d3921b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2040

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          3KB

          MD5

          6adf5c8d2fa515d8ba30645aaed3019e

          SHA1

          cf8786315e9dc1e7497e01a7ff8aa1b17f5e22b4

          SHA256

          bc4ca4866d96e9695dd0ccbe63ebfe42ea92af6c4a14dcc1cea19076352ef710

          SHA512

          08e272446277aa1c5b9e440908295b8bd5e0d445994a022c06888901ed45c5b1a6004492c0ad5286b385888d5d8d85395a1340cf66a7429491ec2379d07681e4

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          90e9498353f7be26b3a8c7bc7230877f

          SHA1

          3f26897d69dc30850d22a338b17b65faab5513a2

          SHA256

          295c291a2d3e9f4ac61364300eca0bf5acd05b42544001fe78b2c58bfcabc937

          SHA512

          9bd0358b9a1d309a7990fe3ca366bc61b6642a2632618dd50ee5577fb6863aedd0fc911eeb73292d7c027e2bbb162e2518031271859aceb7354303b0627d1f24

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          217bf8e343995f57bb20294884ab9c45

          SHA1

          8aed4c328b217caadb9892162f59391f91fc8aef

          SHA256

          196ee76acb2badb5a988b31aff48370f455541df0a5199e2849a3f2ef7f7b630

          SHA512

          d1d53aee127bf0527487fee267a4dd660a31f10f1c8c8548b7c3cdec2a2235f65b986dfe818cd919950d6017e9b11ae1518bfc4cecb76aee75c82e3b601a0ca5

        • \Users\Admin\AppData\Local\Temp\yb8E7A.tmp

          Filesize

          140.7MB

          MD5

          14df61f45b063918edb8df6ec4bba5ae

          SHA1

          81b92a03fe7654c3bea7803baeeeed43113b1b3c

          SHA256

          ab5ac3ee7f849163cab0140c12ad182ab445227bd715df9418e7a17821c860a3

          SHA512

          ec385f798f33968be8fb3466b7083e826d8a49db0cbc830a02549884e1b61e2fea4c869bf29fe1d0f3a164e8fe642790ecc1a6e1ac48bda9050e4026a99b1d08

        • \Users\Admin\AppData\Local\Temp\yb8E7A.tmp

          Filesize

          140.7MB

          MD5

          14df61f45b063918edb8df6ec4bba5ae

          SHA1

          81b92a03fe7654c3bea7803baeeeed43113b1b3c

          SHA256

          ab5ac3ee7f849163cab0140c12ad182ab445227bd715df9418e7a17821c860a3

          SHA512

          ec385f798f33968be8fb3466b7083e826d8a49db0cbc830a02549884e1b61e2fea4c869bf29fe1d0f3a164e8fe642790ecc1a6e1ac48bda9050e4026a99b1d08