Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/02/2024, 20:32

General

  • Target

    04d8c3e1b8d60081098751dea92a60f32ac83e14f9328c07ff004e6dde05db89.exe

  • Size

    5.1MB

  • MD5

    163cc300c4d76e1db6e7393dca7bdde3

  • SHA1

    1de75bc165ce8eeda3110ed7fb5248aa4a9cc403

  • SHA256

    04d8c3e1b8d60081098751dea92a60f32ac83e14f9328c07ff004e6dde05db89

  • SHA512

    a6d18bfc267d369aa005d06cc2fe4beaf8309eadf3ac67a2b96e7d25b2ce67f3da19ab3306a14d9821e4f927ae742e2951274438e2b01cdaa7e38851bd026ecc

  • SSDEEP

    98304:8HenYKGxUcl3nT86Ytacv5Se1KdzOJDb4v+u:8Hr/YtacvuwN0v+u

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04d8c3e1b8d60081098751dea92a60f32ac83e14f9328c07ff004e6dde05db89.exe
    "C:\Users\Admin\AppData\Local\Temp\04d8c3e1b8d60081098751dea92a60f32ac83e14f9328c07ff004e6dde05db89.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2636

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          1KB

          MD5

          dc7ab4855f5d0a2c21c6261ded760c91

          SHA1

          154071d576669bf0db1ccb4c8adba957a7f1f216

          SHA256

          90ebf8eec1c3f3f9c720af54732c0e06444fb10300896effdb5b7dc75776886c

          SHA512

          ec25dde5b8e4ac8b30cd760832f003c4819ee1ab1123912aeb8e462228ce4d1ddde32aa876ef27317743f1bb7c4ae635302298e4fdd6765ab125b8ff95f3890a

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          7KB

          MD5

          016a314607b5009554c6714830b9b3dc

          SHA1

          a0bc436488594d9c148d873eb500902f3d031cbf

          SHA256

          bcf3e4d6cfe11f0fd59af903b8601ef5f83db8fad3bfce0f0f143be34f4725e0

          SHA512

          203828ecad0eac12b6a5f733355d8218c44280db99e36e5260a7194db82b2af083ea0266e7805f60ebe781523c0aed0cee985baf02e679e96fde1a8155958b75

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          dc6f29286b2b6ffc5d9acddf5c5e4def

          SHA1

          264c8024c0f7aeeb12b31c3e055a8a89ad53b429

          SHA256

          bf716852c7fcb5f0bda81a3cdf5b5ddfccbc3b36257d7edbd66a3625b28c3acd

          SHA512

          3efdf8ef19d1f0c202acfb9b6feb8199c4b9c533dd45185411220548d801418670e07b054ca61bc72ecd997a29ce38bb87c5bb1967ca27ed737e8ca138986776

        • \Users\Admin\AppData\Local\Temp\yb41A2.tmp

          Filesize

          19.2MB

          MD5

          6b15854a972d2d80402094b0222e03c4

          SHA1

          fe5c2e478f5950dcd557cf92b9d3f803369f37c2

          SHA256

          445cea750e63fe73c5d26ef2aaaa6f35ce8e0b0861371f8c41e48f3495868c6d

          SHA512

          8f606d0b6c5f93c76406f6cbcba84a3fde14e35e206f25655c000234b15409a624cdf230bfb8763abcf918d4b0a923678ac7b00178a91ff78bf5474c165ddf36

        • \Users\Admin\AppData\Local\Temp\yb41A2.tmp

          Filesize

          20.9MB

          MD5

          fd87095485ab995278d003395781d6a2

          SHA1

          02ff7ea01a305218dcac95c31e11ccdd443a7686

          SHA256

          922dd6c63a6cb5939a98e8a25fe35bcb81410e21800f13e70a7ee5fa6f91e4d1

          SHA512

          178f8b695c6cb55a094839510a8a447116126f2e58284876307da5d9f32d60ad4cb40caae97458c4b7428071c0496bab4d81e7211fd95b39ffa6936a27e924c9