Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 21:16

General

  • Target

    4ff911f850fe81a114b3f7ff61a734b54d207642332b5eacfe55d039f2fd61c5.exe

  • Size

    5.0MB

  • MD5

    9a848b7440e1e55767bb9159a728149c

  • SHA1

    6f28d89b7fa736787d1ec2c0d6030538e7660527

  • SHA256

    4ff911f850fe81a114b3f7ff61a734b54d207642332b5eacfe55d039f2fd61c5

  • SHA512

    e8557ffe58f1b62c82d5bee3fb97ab62328d0c01659ec7129e79fcbb08381e67f971a611f93192f4179cfd01aeeff9d9247a8bbb5a8d9b8eb41b5a21c9f6dae7

  • SSDEEP

    98304:QLPIAN/nUeKbj+U+o4TTOM8KdzOJDb4v+B:LAN/W0nwN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ff911f850fe81a114b3f7ff61a734b54d207642332b5eacfe55d039f2fd61c5.exe
    "C:\Users\Admin\AppData\Local\Temp\4ff911f850fe81a114b3f7ff61a734b54d207642332b5eacfe55d039f2fd61c5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2228

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          8af83c0145417085188261e7b5786c17

          SHA1

          83152b16247e400d57ad82910e36d3a6bfe94d07

          SHA256

          70e3e934d87e8796b305ba12052ccc67d65b7ea1cbee79da9478d8b9d4e9d690

          SHA512

          937998ee42b3e6050a88e883817ca1b65fef2ff3175461c27923e10b1207bcd36ba78a37f7d1c45f0e8d28049b2db186e45e3e83d5c049c5ce041a8008f0b0b7

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          0277082827bc6b25f9251dce01983e4c

          SHA1

          399e3166867e599670e03653662d823267ff8cb2

          SHA256

          b318411315734130ac2a19df920b3531f214b86b6ee8e1da030404d0b6a5f7a3

          SHA512

          0059135b25665dd9e05b8c714d4c151019d152fd99681677d58c8276adcc9a4fdd64d275c77182acd898d637a2fee585e2e6cb3d1ba262d62bd67907a6bc26e4

        • \Users\Admin\AppData\Local\Temp\yb13CF.tmp

          Filesize

          60KB

          MD5

          f54250dab58a1ca53b984979d08d9235

          SHA1

          899e9616dbcbc0ced3e31e7335bf12157e9ab3a7

          SHA256

          48b9fe0f5b53ccce2901966414a05162401d42b3076b8ab033d13187097e56cc

          SHA512

          86250f7f4620dcbbb3678339c79f5e26f0bf8fdad30e371e687151d06ba11f5219108fa4ff6f91a2407bdbd0fbbfacbd6772421ec65a9391279326227a11f0dc

        • \Users\Admin\AppData\Local\Temp\yb13CF.tmp

          Filesize

          9KB

          MD5

          b1420af54fff6320d8f4e63e44110159

          SHA1

          0618e8db74c8667a8d260cc851f81e6a05d4a8d0

          SHA256

          230551e788479cd677079a9320025ae752272ddf4c430e3942492049769efbd1

          SHA512

          b795e0a7aac93d896945e9176b056e0ab4a7d1794e917d10d14b73dd4eeffdc2970ef6956f1c922d7d7e2b8b6d472ef83ca29130988434f620214bd7753ac638