Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2023, 17:03

General

  • Target

    7730bb79db219b8a383e5c084bf9d7c8eb18dd363cf1f43509796142a7b2caff.exe

  • Size

    4.7MB

  • MD5

    db26c8e8862e8ea8df7f735740ca7f35

  • SHA1

    43b3701789ac5803a2bc61dadace5fd5f410fb5a

  • SHA256

    7730bb79db219b8a383e5c084bf9d7c8eb18dd363cf1f43509796142a7b2caff

  • SHA512

    1b401d610ea90f9243a6b7809990039245db32069017ee2e4f4760b70007be3a25bc2b0ec9e3d98bad46e6097786e6bdc6d2cde92705c592867f71aef7a1589e

  • SSDEEP

    49152:pFu0DxJ7eN9Fd8iz2prAbjf+yh2HZvj1Jf5QpSX95+r5u8QeKxFOJxdb4vZKVI:/DxJifFR2pEbjf4hHRQvKdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7730bb79db219b8a383e5c084bf9d7c8eb18dd363cf1f43509796142a7b2caff.exe
    "C:\Users\Admin\AppData\Local\Temp\7730bb79db219b8a383e5c084bf9d7c8eb18dd363cf1f43509796142a7b2caff.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2040

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          1KB

          MD5

          f0be590e2e9f593102c80ef64919783a

          SHA1

          b24b0b6251214f635d78a69551f183861e9cf9b1

          SHA256

          ddceed9a8c91c81631616036482db092a43a27df44bed0d3d62a333505ceebb6

          SHA512

          8ff79a1697f49e076a6273f6868e74a6c547cb48034fed6645d2e1a367a2e51ca8c426e9b9d8fe42ba5abbf8d97ecf1bdf10850ebd0ad2b7a244250b181097d7

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          f2635c43fca809e64cb0bba0206f11c3

          SHA1

          82ab788f56a215051130aaa7529b7642f96e4b70

          SHA256

          654c3814b516467211ad4d00304f54f72044165cce6408b4101e64a8c2040740

          SHA512

          808d7624b1e149b47361c4e3d6fe4b55e741715f9790c2f38d76369f6406473a9aff1ca98de4824e34c1825236a6403a1d6ea42a6e3f07994b284c33e8904aed

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          62263764ecb4522095f48cc31226b64e

          SHA1

          5b1fb209f4f642f85046b05228f27f232db30fe2

          SHA256

          41218107437ab4f9243b644c6902097d0d1293a91f6b66ca3d66026c9dca4d9b

          SHA512

          c5cb31b835321bdfac9a443b1ea9a1daffda3c6185b394db553733100e7dd5ef43d1044b0226f6bd8de3f22ccadaa32acb7470a96a88e932f32f2a2571ae1837

        • \Users\Admin\AppData\Local\Temp\yb9482.tmp

          Filesize

          63.7MB

          MD5

          5d50e0511ae493454f86e9e9f12b543b

          SHA1

          0a1543f76992e6eed6d8838377f1a88317bcfe26

          SHA256

          d7202ae9854d89d7c2d6985094ad085776a82941d77619143d438a337fb4e482

          SHA512

          8f9db7c1e1f87c63762baae878b5c0d1fc27134d97bc33f9927c9af413896c1d75e3f50c6d2795147d6ec1ab0f4b633ddf57b1a8d19ae52a315cae72be7c06a9

        • \Users\Admin\AppData\Local\Temp\yb9482.tmp

          Filesize

          63.1MB

          MD5

          2c7073fbd2a2a6b55de2f03190250245

          SHA1

          c48301eae6d2036f6196773bd1d397b00451eabc

          SHA256

          259718b5f3662620e5114d66d38be92236faaeecca42ca97d732ecce9713472a

          SHA512

          a4cfb5e27fb0c24935a0f5388d8a8f32391f06d20dfbaa6d17faa0aa65ae5ecfb5ac428fe35f484b181f87fb31fab94e4a774c7693dd509635a42f579a1aee87