Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 20:52

General

  • Target

    79537bcff588985167094e6284b60cb657c619c9184583c8a96cc630ff1c999a.exe

  • Size

    4.7MB

  • MD5

    293a4815b2444c7dfb5e0c2920844e9a

  • SHA1

    2d9613a579680edb7cb41d69321b69c040d50740

  • SHA256

    79537bcff588985167094e6284b60cb657c619c9184583c8a96cc630ff1c999a

  • SHA512

    c940a3c7c33717d4cb8c7ab0c98633aac45864ee3f51ce44afe2319e5f21a494cbd5df3d57f994539b54431799aa34708985deb2bd7427346be6d821a17614a1

  • SSDEEP

    98304:shIHjWibmorLobjYXzZpvF1Ff7PKdzOJDb4v+8lz:vWibmoFzZpF7SwN0v++

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79537bcff588985167094e6284b60cb657c619c9184583c8a96cc630ff1c999a.exe
    "C:\Users\Admin\AppData\Local\Temp\79537bcff588985167094e6284b60cb657c619c9184583c8a96cc630ff1c999a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1872

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Cab89D9.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          1eab39f4ba213850d27a22e614b80ff3

          SHA1

          0955118d1135741cb85d3d49e9cc74f000e8d1db

          SHA256

          84754c0c74d68aa8a3b879119ed7081e94f6cfabdc3eb697f18dcb8933de950c

          SHA512

          a473ae8bc26292c7f09d79bfdb7f42f8a9dcbd50385ad3a414254d1e4b02588c85127734b0744ab73c5557ddd51f0ff827d36d98c9c2ea4cd738ab94568b364e

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          b887fd077f3894606340a4fad828e51e

          SHA1

          5f30cfe3a9917dc8634bfa0f45f28e6515a3923f

          SHA256

          1518dd0cdf4e4e49c423d28be5c4d044db19ba8ec7980e7c5a92adb168a55e79

          SHA512

          6aa9e0cca45e3e46aceae9cc700df1f0fa7631501789abebad1eb264ca260e7cda9073b66512c6d5117e795d90738c95d9471e18c56c170fe22560510e0dc05f

        • \Users\Admin\AppData\Local\Temp\yb3F13.tmp

          Filesize

          77KB

          MD5

          673b993386c688229030a64d9ccf5f0b

          SHA1

          80148bbcccfa1a007c39c8120d5306cdaed7742b

          SHA256

          fec802ab7b782373774319979014ad780cee04ea0608d9334a1b67f12490693c

          SHA512

          53dd65eda0c0f4a90185fe5febad510f5a3f4f8fbaf00146dd836126543cce645b3a3de88fe6ca0286df6d08f7d37026887f65a30d741bdad67ac83678fa1fb9

        • \Users\Admin\AppData\Local\Temp\yb3F13.tmp

          Filesize

          217KB

          MD5

          671092b92cb5b0b26a8de4d0dde13d15

          SHA1

          2487056e83ee0191b12ca68ee764dbc85b88629b

          SHA256

          bbb2ac8fc7f54b702a1c785600930b03cae36f216bb6a8d0580017467fb09c61

          SHA512

          95766e95cb0371ae4721c2a57b24ff4a7862782fcf593fccf472c9912317cacb9d62b75b0ee6ad1a03911c5d8dcbe699ff670845cb418b71b8ea8b13b20d9c76