Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 15:19

General

  • Target

    3f7d924b55c561fe2d41be336695a45f9a24ba5423f18c762c8598ad628f2db0.exe

  • Size

    3.1MB

  • MD5

    423b006f029fefffb2b6538f4ce19446

  • SHA1

    bb1b34613abd61941e862d914e448cf38b1afb91

  • SHA256

    3f7d924b55c561fe2d41be336695a45f9a24ba5423f18c762c8598ad628f2db0

  • SHA512

    5a9befba339285c9e32eb1697c531ef4855f118eda19ed5f867527b20d1a1bd0ef37a3ed02ffafcf297dce75eb96d3d75750dce0c71ce6aa3493c7c7a3f4c6fe

  • SSDEEP

    49152:w4mkLcS+n5bM4Fppk4GIrLhHpt+8R9vpdOFki+r5u8Qe:w4FLcS+N5Fpi3U1Bfvpd7K

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f7d924b55c561fe2d41be336695a45f9a24ba5423f18c762c8598ad628f2db0.exe
    "C:\Users\Admin\AppData\Local\Temp\3f7d924b55c561fe2d41be336695a45f9a24ba5423f18c762c8598ad628f2db0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2424

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          1KB

          MD5

          633938847bf2cf29a373c7466efab805

          SHA1

          b01a240213825520601cc3a000c2ac21ab31faa4

          SHA256

          21528f279c277197cd06af5b41ee6320a1b6d10486aba34138fdace37367f36f

          SHA512

          4841e334d7ffda8e426381d001a7164347d45bba1db975b464b0fe5509c03a5cf0aadc4e2fa6d854d49558dbe14c0e3f3d430c89c9ac7a4df02bbe25cf219c83

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          8KB

          MD5

          9fbc73215f0980d7428ce1571706bd27

          SHA1

          8330248f2a007039aeef218c94098478f86900e1

          SHA256

          f43f4e4f3cab6c6b814efd12c2cac6a10ccecdce03d5e9066e7d6a08eae2ff43

          SHA512

          d05e5512eb3d5a028e335bcf27b93edf1faeb66a5585036edd92fa3d61827a0bfa098cef876e2f183be8b7fdefbf81b5905ab20fc0f5adb3ee3c6f3abbc4513a

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          a6d1874ec36f2285649158c33f420188

          SHA1

          65e875f1b2e4ec8493c934c9c055e3b6000614a3

          SHA256

          c6b30c63892eca83698ff4ee082539f111bd3afd3eb331bfa0ca44834d6a7e91

          SHA512

          9adb5299daa0bd556dcc058b2c6a82351a0594c6fbc857732270819a3e22ea5900370fc977f0e97e3952a8bccf0787ccfed5c086e51287ac881143e3b22a2712