Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:33
Static task
static1
Behavioral task
behavioral1
Sample
77d645d1dd98648b6269cff06c775aa6c4f716c43d9f8459bebd213f6ed07742.exe
Resource
win7-20231215-en
General
-
Target
77d645d1dd98648b6269cff06c775aa6c4f716c43d9f8459bebd213f6ed07742.exe
-
Size
5.1MB
-
MD5
a6007ba08ef6e1111ec68279f6fc2e78
-
SHA1
fa74a68e63c56f9443344103b629a4387986fa90
-
SHA256
77d645d1dd98648b6269cff06c775aa6c4f716c43d9f8459bebd213f6ed07742
-
SHA512
0332a943de7bb0c014cc7fdda3304240dd313363e016af23b6637831beacd60771920d8ec51a46ab3746b8d210a174b1b9e017877e4f5541c2a4ae2d9350e9b8
-
SSDEEP
98304:8HenYKGxUcl3nT86Ytacv5Se1KdzOJDb4v+u:8Hr/YtacvuwN0v+u
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
Processes:
77d645d1dd98648b6269cff06c775aa6c4f716c43d9f8459bebd213f6ed07742.exepid process 2348 77d645d1dd98648b6269cff06c775aa6c4f716c43d9f8459bebd213f6ed07742.exe 2348 77d645d1dd98648b6269cff06c775aa6c4f716c43d9f8459bebd213f6ed07742.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
77d645d1dd98648b6269cff06c775aa6c4f716c43d9f8459bebd213f6ed07742.exepid process 2348 77d645d1dd98648b6269cff06c775aa6c4f716c43d9f8459bebd213f6ed07742.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
1KB
MD55ac41bfec487eb32fa1210b7551e1815
SHA130505ba169c996ad3af05a702597183ca065f18a
SHA256a4f70cf555bc86ec2b47f284b5073b360d04dba9b8697ee152c0736241a042fb
SHA512b3e4e2763d4d52c5d8db10dcc6d633250c640212fe79d77eb33bc58995bfe9645772ec16701d53745fc785b4a50230a2317428057ac5148538ab74ddb576b35c
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
4KB
MD56fe1ac4cd55aa3a64a322388aed8765e
SHA19bffd9ca31a949775b87002d8473cc4a6caf9c78
SHA256190e9324102138992ca9aac850ac447372b92532b55a62f4bb30d09643232374
SHA512769606e20e1648924b0ba322b790929997966446d164173a81cb2f5b2d39ef0b7ead4dbcb7adc445574592440a3b4ce6923fd0be7f9dcafbb50171953817798d
-
C:\Users\Admin\AppData\Roaming\Yandex\uiFilesize
38B
MD5588ae19ad87e6a79f13f63c4a9fab2e7
SHA1fa902dccec9d8092aa55f6df0eace84ccbf85d74
SHA256ae8f1828257c694eb8cc12327ab2729a019810b9e07e3658252528e9b71247d1
SHA51278ec5645a1f418efa7e4aa870ec621fb8e2fd452a9e44bba92454c0b1a903cb816a4a7520a3cc65995cd727558885c480dcfd358a5229402e23b98f3c44530b4
-
\Users\Admin\AppData\Local\Temp\yb4E6E.tmpFilesize
874KB
MD5b58b05805356233887c8a8e6d3b00c96
SHA128577f8b17226c5b65baea5a2e167262b2749641
SHA2565af2ff39bda7a545992e1142b2de7b176afe4a6596917a861ce343ec991cfa62
SHA512b020a32486829897833158bb94b4eb8074ebea5e8cd124fe19c2a16c3335cc0672105febdd8cbf1f29f60e4cf6aab78da035d5a6847a7f0e9e2054d63d41f3b0
-
\Users\Admin\AppData\Local\Temp\yb4E6E.tmpFilesize
806KB
MD51b67861866b628f6574c56fe694e8917
SHA1c23e3cf30a77c53922e57727bea9fca265db96ee
SHA2566b434ecbd3be7b390da50dbb57c1411f645accc192e2e20fecbc656afe4a2d82
SHA512f0249748bfa27af207d2b45b91a5384d12efe780bc35bf2143833cf3014aaf6dc331e18444ca062ff1eb20ab20ccff5e7a47478d6f4c2f558f18997e2bdf021d