Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2023, 21:03

General

  • Target

    1fc7a0a7ea2087fe24cb09f219adcea95a7a826464ad1f08f451e14c15f08c3c.exe

  • Size

    4.7MB

  • MD5

    0034b6bdc96738eadb56b161d525ad94

  • SHA1

    bb5371b8b66624251b9875d7c66328f54fb2a28a

  • SHA256

    1fc7a0a7ea2087fe24cb09f219adcea95a7a826464ad1f08f451e14c15f08c3c

  • SHA512

    a457d0b2a0774588159d21a6a872134469553e1ab91f58c7aba3ae93e7421887dd86359fde64a21f7756c0100fc5623e8117427da06fcf1387b5a8ca9845d7e6

  • SSDEEP

    49152:pFu0DxJ7eN9Fd8iz2prAbjf+yh2HZvj1Jf5QpSX95+r5u8QeKxFOJxdb4vZKVI:/DxJifFR2pEbjf4hHRQvKdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fc7a0a7ea2087fe24cb09f219adcea95a7a826464ad1f08f451e14c15f08c3c.exe
    "C:\Users\Admin\AppData\Local\Temp\1fc7a0a7ea2087fe24cb09f219adcea95a7a826464ad1f08f451e14c15f08c3c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2016

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          1KB

          MD5

          969a618deb76e2b0eca8ece554528716

          SHA1

          9fd3e1461113a26b3384b91393f7cf8072a77c29

          SHA256

          dae6f472d4633bbf9cc81382af8f41fae2b10b9f67cedc3d35635436622dec2c

          SHA512

          a525f9ee5bda377eb94fab3ec949309ec9f60f7c69dd128d870fbd413ffb0d92024cef0cecf752aa4e61a600d1123c63d89b87da2631a35046e0aebc872ece01

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          292fd4b14c57ac76496ba56c2e6313df

          SHA1

          054c66ab81f9e3f58faa48e5c2ebe3e946c0aca1

          SHA256

          e216507a45c04be2ca117fb956a5d5dd4469eb46a8daa0dab85e967fe52417f0

          SHA512

          52e27f8858ae609533fd7fb13b5615f1327e84abf2773809191f6d6b0ab8514f448167b8056b3410a36cbf0b6c559f5e5558249b33844434dadc8999b2fd9cfe

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          0ef409a6d77dd4cb5474c6fcc70eb4e6

          SHA1

          784ebc43a8836a21c9e814759d44bd383e7dd1f7

          SHA256

          99d9db705ea8851999eb4206135d55daf0bc9a7623953593b783bbfa603530cb

          SHA512

          9b1edfba108987b1caca9c37db8ac09c41ab643524c205a13e803da1159cc37902a8ec0d48285a395e39f5d59644ff95a299b6199eb5a2ad0b8cccda1806a4dc

        • \Users\Admin\AppData\Local\Temp\yb4F87.tmp

          Filesize

          134.6MB

          MD5

          d2fab09bcdd98afd12b47f065f3d78a8

          SHA1

          12e9fc7c0ca542b4678c5ecbfa2ec4339fe28db3

          SHA256

          35bb254b98f429d130cc626ae118309a1f142b5256117fa0be819d51913c266d

          SHA512

          babf88df838a0957426a322d995b0824125a06934f85daf0b6f88d6c2a3657847bc4b54c2290575e68da2f57367c49a7bdd0157354b999d28e3a5a563f4c349e

        • \Users\Admin\AppData\Local\Temp\yb4F87.tmp

          Filesize

          134.6MB

          MD5

          d2fab09bcdd98afd12b47f065f3d78a8

          SHA1

          12e9fc7c0ca542b4678c5ecbfa2ec4339fe28db3

          SHA256

          35bb254b98f429d130cc626ae118309a1f142b5256117fa0be819d51913c266d

          SHA512

          babf88df838a0957426a322d995b0824125a06934f85daf0b6f88d6c2a3657847bc4b54c2290575e68da2f57367c49a7bdd0157354b999d28e3a5a563f4c349e