Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 16:33

General

  • Target

    77d645d1dd98648b6269cff06c775aa6c4f716c43d9f8459bebd213f6ed07742.exe

  • Size

    5.1MB

  • MD5

    a6007ba08ef6e1111ec68279f6fc2e78

  • SHA1

    fa74a68e63c56f9443344103b629a4387986fa90

  • SHA256

    77d645d1dd98648b6269cff06c775aa6c4f716c43d9f8459bebd213f6ed07742

  • SHA512

    0332a943de7bb0c014cc7fdda3304240dd313363e016af23b6637831beacd60771920d8ec51a46ab3746b8d210a174b1b9e017877e4f5541c2a4ae2d9350e9b8

  • SSDEEP

    98304:8HenYKGxUcl3nT86Ytacv5Se1KdzOJDb4v+u:8Hr/YtacvuwN0v+u

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77d645d1dd98648b6269cff06c775aa6c4f716c43d9f8459bebd213f6ed07742.exe
    "C:\Users\Admin\AppData\Local\Temp\77d645d1dd98648b6269cff06c775aa6c4f716c43d9f8459bebd213f6ed07742.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2348

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log
    Filesize

    1KB

    MD5

    5ac41bfec487eb32fa1210b7551e1815

    SHA1

    30505ba169c996ad3af05a702597183ca065f18a

    SHA256

    a4f70cf555bc86ec2b47f284b5073b360d04dba9b8697ee152c0736241a042fb

    SHA512

    b3e4e2763d4d52c5d8db10dcc6d633250c640212fe79d77eb33bc58995bfe9645772ec16701d53745fc785b4a50230a2317428057ac5148538ab74ddb576b35c

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log
    Filesize

    4KB

    MD5

    6fe1ac4cd55aa3a64a322388aed8765e

    SHA1

    9bffd9ca31a949775b87002d8473cc4a6caf9c78

    SHA256

    190e9324102138992ca9aac850ac447372b92532b55a62f4bb30d09643232374

    SHA512

    769606e20e1648924b0ba322b790929997966446d164173a81cb2f5b2d39ef0b7ead4dbcb7adc445574592440a3b4ce6923fd0be7f9dcafbb50171953817798d

  • C:\Users\Admin\AppData\Roaming\Yandex\ui
    Filesize

    38B

    MD5

    588ae19ad87e6a79f13f63c4a9fab2e7

    SHA1

    fa902dccec9d8092aa55f6df0eace84ccbf85d74

    SHA256

    ae8f1828257c694eb8cc12327ab2729a019810b9e07e3658252528e9b71247d1

    SHA512

    78ec5645a1f418efa7e4aa870ec621fb8e2fd452a9e44bba92454c0b1a903cb816a4a7520a3cc65995cd727558885c480dcfd358a5229402e23b98f3c44530b4

  • \Users\Admin\AppData\Local\Temp\yb4E6E.tmp
    Filesize

    874KB

    MD5

    b58b05805356233887c8a8e6d3b00c96

    SHA1

    28577f8b17226c5b65baea5a2e167262b2749641

    SHA256

    5af2ff39bda7a545992e1142b2de7b176afe4a6596917a861ce343ec991cfa62

    SHA512

    b020a32486829897833158bb94b4eb8074ebea5e8cd124fe19c2a16c3335cc0672105febdd8cbf1f29f60e4cf6aab78da035d5a6847a7f0e9e2054d63d41f3b0

  • \Users\Admin\AppData\Local\Temp\yb4E6E.tmp
    Filesize

    806KB

    MD5

    1b67861866b628f6574c56fe694e8917

    SHA1

    c23e3cf30a77c53922e57727bea9fca265db96ee

    SHA256

    6b434ecbd3be7b390da50dbb57c1411f645accc192e2e20fecbc656afe4a2d82

    SHA512

    f0249748bfa27af207d2b45b91a5384d12efe780bc35bf2143833cf3014aaf6dc331e18444ca062ff1eb20ab20ccff5e7a47478d6f4c2f558f18997e2bdf021d