Analysis

  • max time kernel
    121s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 16:32

General

  • Target

    a341a440db90dfa8faddcb114c480a7d14523f3075c9b37fd4d49d39c8d0c3cd.exe

  • Size

    5.1MB

  • MD5

    6344963540caef80e39fc91c3d97e028

  • SHA1

    989c44169867609cebb88fd76abf2a0b910c35b7

  • SHA256

    a341a440db90dfa8faddcb114c480a7d14523f3075c9b37fd4d49d39c8d0c3cd

  • SHA512

    ddaed318d9f5ed2792a35a2c1d3799486238709c6c79e709fbdf36c55d9e974ede8131f8074c849e5dc8eb41c5f546ea0ed63f3d7f5b3e9f75baa603211b6aeb

  • SSDEEP

    98304:8HenYKGxUcl3nT86Ytacv5Se1KdzOJDb4v+u:8Hr/YtacvuwN0v+u

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a341a440db90dfa8faddcb114c480a7d14523f3075c9b37fd4d49d39c8d0c3cd.exe
    "C:\Users\Admin\AppData\Local\Temp\a341a440db90dfa8faddcb114c480a7d14523f3075c9b37fd4d49d39c8d0c3cd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:3040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    71081ac3fd89f09e43d72712c99a8c29

    SHA1

    bd86c9dc2ce539448f1d243ce88bf56aab473652

    SHA256

    6f99c68460b9fb0ea097a05e6c9bb9fb218ce5cd1f585086fa83a350bd3f5eea

    SHA512

    1a1dd420d47ea79187459dfe12c5ee8a477605c87b5edc09471fdfdce3627000e1ac0352df8732af2fbc8c7785e9f82d6c52da989b9c6e2e6d02c0cd94d5a4a1

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    5KB

    MD5

    d9e23c926b918a0e6005b4061f7cc152

    SHA1

    36df34062341ff14f7c10f2a101d7c33e0440ef2

    SHA256

    0ba94b5fbb3c341f8030ba29b46eca74bc710a2e5942089ddfa959292e6a7cfa

    SHA512

    50aa6b72ddaf271868447aea8478194641727659f8c643706c5a08109eb711418608c6cdb82863ec5b249d3888b46709a3625adef544e3ee864475ec51b17e8b

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    46ed7605adea6b7eafd5762371770e3c

    SHA1

    e645e3ed6005fa81ac7100212a86932d6ef7b968

    SHA256

    878314dd0e7e0effe437dd5e56fe28255b6e0cdc73808cbb8059ec77f2bb4d17

    SHA512

    f64875b59a72728ac45600ec27e2a7de06f4ee5e69bb9da29fb5f8550c78c0540dd98046a6f009b4dd43ced9a326ee5a41f0de8d538f0f1eb93d2c9e4d71b972

  • \Users\Admin\AppData\Local\Temp\yb9B36.tmp

    Filesize

    20.1MB

    MD5

    4bb7aea003a7246ee282e162c13565b3

    SHA1

    49ae99738ffc63994d1135e30f6f88c1ecf2e783

    SHA256

    02316fca37de93f3736def1c59510fbbbf4cdce6510d96acd42111736c0fd9ef

    SHA512

    728e0b9440b032b908ca7f9e75cd5866b36af853eb54c91f25f91c99a934af43521c013440b020a96e4f45cea36c4d0c1a800f2a009d60cfd4e0f564b577a810

  • \Users\Admin\AppData\Local\Temp\yb9B36.tmp

    Filesize

    38.1MB

    MD5

    1150a734c4f66a3f40b6d43c502f5149

    SHA1

    69701d8628e3f247779fe672846af449fd4dc8da

    SHA256

    0b5789b70b4473a6e111e756a5b72394ff42a8f59241f88daeddc7ca7c4d1408

    SHA512

    713a16a96a406a3ac5b778b35e31464b58d8955785b7e80764e3354b4f46a83fef205fa73bf3bed1608652f705f673dbfc5790b428ea00877289fc0a9753f781