Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2024 14:03

General

  • Target

    8fd7f33962af428773ccce59190f7bfa3d25366cbf3029b7a3556bb7c56c9e27.exe

  • Size

    4.3MB

  • MD5

    01a2569f0520794c6831187ca991dfd3

  • SHA1

    318f250c1361a3af2afb73c146478d00c309fa36

  • SHA256

    8fd7f33962af428773ccce59190f7bfa3d25366cbf3029b7a3556bb7c56c9e27

  • SHA512

    bc82f050bc9b4d2d85b2af76128b280ed582f8c59ba3d3a839f9307d07a240f6270bcf17fca319ac1364cfd8539b4b8ce5a99e8af2049ecbaf5ded6af9fcaab4

  • SSDEEP

    49152:qMLPIdiWU/o5LcUekfbj+whw5+r5u8QeKxFOJxdb4vZKVB:bLPIAN/nUeKbj+UFKdzOJDb4v+B

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fd7f33962af428773ccce59190f7bfa3d25366cbf3029b7a3556bb7c56c9e27.exe
    "C:\Users\Admin\AppData\Local\Temp\8fd7f33962af428773ccce59190f7bfa3d25366cbf3029b7a3556bb7c56c9e27.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    e328730b15e51c72c7be2f1bd6df99da

    SHA1

    c527bd7eda26fd89e20ba5548165c6eb4bdf1fa4

    SHA256

    cd39446f9df2efb6fe28285f4db8e54612526fa7572d7222e5b4a687f3a1eda8

    SHA512

    497c6ad713b80658b1d0a613be815b49ef812e792fd98da298f2357aecb852a0a3132f85e98adee6d469cc52578cd8b1b1d4a75e7dc88309eae1625a0be2d1c5

  • C:\Users\Admin\AppData\Local\Temp\yb7F1F.tmp

    Filesize

    2.5MB

    MD5

    f922c78664c836956e87c7fe65c54fce

    SHA1

    3ffd95c98542eed7b3748e8961d546409f06efde

    SHA256

    ea3b5edeefeb3fc6f27e90fa764e3c2c505375171af49e44f4b3608c77f57324

    SHA512

    95f355c13cc866da74f9ce0c3ded8bcc0a39bad3728be9edf65db96f08610c1a48a92c16d3d4b3a9bed0f3c7b97e78d6850f5a8aef3586bf4f652d74475dfa18

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    e96e3c8b5e6598b7e5809e99d002ac7b

    SHA1

    05a673b62c802d882cb3a3190bdc2a724b94aca5

    SHA256

    22826cc94f81a10745923f1568dfd4f1fff4b475e3f7654ad23539a11967b206

    SHA512

    8d090316520b06798135d60ff283fa9b7decd0aeda92254fd2ca7b7937bf4be98d94693c0ed6efcf193ad5f775de1f1fc03a286b29ddb748e1a1720f3e3774e5

  • \Users\Admin\AppData\Local\Temp\yb7F1F.tmp

    Filesize

    1.6MB

    MD5

    44f1fe9812e335f2393b6dc6f565946f

    SHA1

    e0ffbefb4d99d70e4a1b53d28bee87a421ff8d8b

    SHA256

    8de14c38b7c18aa0e164f5cbe5ad95976638eee6a66d8038225c0646f34827f8

    SHA512

    9a883f32c4caeba03e5167d3fb7e97490c919ea7a63a5a06afc2051ca445dfe76bb81395200c79d6ba7263be870a6e63c2a28cc1969d3279a69a7c856818dfa1

  • \Users\Admin\AppData\Local\Temp\yb7F1F.tmp

    Filesize

    4.0MB

    MD5

    9929e70505c3a790a650f7df1d570a1e

    SHA1

    aeb472dc62ce561477387557d8f11b82165bf079

    SHA256

    5d2129a2e08cf1411d059facb510afa60e1a1c50516de73ab400de69da30d39d

    SHA512

    401875a6470f66c16b3d15023106c9487411373e055ce26927f00adc4290ee9ad0204a0d976ef9436b0ae09c82ca1051056d2d1fc636f705a42b1fbba788d30f