Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/01/2024, 22:32

General

  • Target

    054daf3a5a81b5227b61f840d369c10ddabee38f1061ee04bae3c575dc25ebce.exe

  • Size

    2.3MB

  • MD5

    654bfe1a89c088b7978688eb4f3d1b1c

  • SHA1

    7db12033fb7fa46317a8758b90563af56978791f

  • SHA256

    054daf3a5a81b5227b61f840d369c10ddabee38f1061ee04bae3c575dc25ebce

  • SHA512

    306a424168fffa85133d1d91179238b2efacbfa7cd4530e1bec05cbf6ab75af17adce79122f0b99dc272997ce70d0e357b3aa35e191697ba589dc77410e1a174

  • SSDEEP

    24576:B5gEUwmt0f7HRZ/TJRMx3ZEHnF3hnUTIIgocXKFvLhRIdsgTRiKAf0aIz5H5un8V:3zCKHnFmTgAvLnIBT8K4A5H5u8QeN

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\054daf3a5a81b5227b61f840d369c10ddabee38f1061ee04bae3c575dc25ebce.exe
    "C:\Users\Admin\AppData\Local\Temp\054daf3a5a81b5227b61f840d369c10ddabee38f1061ee04bae3c575dc25ebce.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2248

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    3458f6e9946df91289183c003f46bb3b

    SHA1

    9d04ccc451d18f0e5d271d75c92e7722526ed3dd

    SHA256

    697cb65b14365d0e70858b30017e422fb2d980d5cab742471964f657ca0165fe

    SHA512

    3eb2f5a799753a7123d4b4efb1c1ae55b730fc78eda55144482c1150384754ea626a31866956f63c8a9f41cfc5be9ef0555db105170a26c1d56ae3f832b48298

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    d0845d3f6d3417af466fbbff252e8275

    SHA1

    3dbb25babcdd50fed9c2037af5557e735667df5d

    SHA256

    3963a356dfb4ca554c0b2507014e3e4584711e0444dc9e4c6f8d29654d483a88

    SHA512

    d183b42d8539e0edd6056c43bbd813a69933641c4f166e21d01e19be4bdc9d0559bb1f402ec03d2e8e91f7333b47e58d976a8d3bff0e5d66ece8b858b41a18a5

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    92b3ea71dbefc33675b5333b92aabbe7

    SHA1

    78f8a1513f32cd02cdb86bec216db16a534266ac

    SHA256

    27fc85b94a7b9d91af2a410ad07f9400c96c62d4280f194f7ba5a20ebc3c7fe1

    SHA512

    c7a2b821ecbdb138238c3f29af53f0f733b0edf93e05a31530931bd9894c0d0af0789af8e21f602b082f3c03e23af3206242a28ba2d330af12235af7c9aaa9de

  • \Users\Admin\AppData\Local\Temp\ybE91.tmp

    Filesize

    7.5MB

    MD5

    acffa8a7fdfc1f6106dfbd6a22298531

    SHA1

    a5b39e427cac07c19d4ba89764b821f6603f8697

    SHA256

    c2bbb39d4b3071d4597e9f15f9600f58855aa61f9247aea96bf9d2efecf9b1eb

    SHA512

    866e40f85240f794628b2a482bf793ae44df34b945ce515cf8369f7c94f4e6a13202f17bd3a09f0a6c78100a7f0b342f83bffeddfeea42cb34f42206aa34c49b

  • \Users\Admin\AppData\Local\Temp\ybE91.tmp

    Filesize

    21.4MB

    MD5

    94856323f62144cb6965878c956f2fac

    SHA1

    dc101dfc6198a9e580105f82452c3677fd31baef

    SHA256

    4d97f659a983ca9a36c5d61bebd1e1f03381cb7f83fe6e4e5d047eb129224fff

    SHA512

    2ee94c13462d20e520b66400e037e4a0eeb673801875be280bfb95a154dd7e433f7997ecdea5ac34e59d479b7b6befa0c60e6dc9cc6798e982b329fd3fb0500c