Analysis

  • max time kernel
    118s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 22:56

General

  • Target

    abf73cba31b11511ec775b6747d3439ba582e6d0be98c29a5f43bea0ce403c86.exe

  • Size

    10.9MB

  • MD5

    1c9bca04bc29f80988397537a24509c3

  • SHA1

    2c319b54d65f1afecfd34a8a19f6a8eed4d6ac26

  • SHA256

    abf73cba31b11511ec775b6747d3439ba582e6d0be98c29a5f43bea0ce403c86

  • SHA512

    d1c511b3248c3bb5a7b55495a6b39407f97791f40dddf87016b1be877cfb7aabca8f631448e0c0cd898c453eec8c5bbe733091564741c00febb01acc79de1198

  • SSDEEP

    196608:ubGnWW5WySSJ7PbDdh0HtQba8z1sjzkAilU4I4:uKnW6Wy5J7PbDjOQba8psjzyz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abf73cba31b11511ec775b6747d3439ba582e6d0be98c29a5f43bea0ce403c86.exe
    "C:\Users\Admin\AppData\Local\Temp\abf73cba31b11511ec775b6747d3439ba582e6d0be98c29a5f43bea0ce403c86.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:784

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          e9da7d822236e280a0ac6c57a4ec8eee

          SHA1

          e58068dcd0906215a61a496cbee59f85b5ca4adb

          SHA256

          d30753475ac74a551046d8e75e6b24fafd53bec5add75340c472152410f0f98e

          SHA512

          e9086e1c61815e76541363a3c9921a82c38efb5426ac22e077717975fe8c8f2d0225be87405eed4c00fcbf00a8c823eb4e3a4e1d668997b613df61af62eb20fb

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          db116afcad2c9bf8ea97d9853aa53811

          SHA1

          af94eba5e54482bd4d8e5d2ee88cc111079ec5f8

          SHA256

          0e74fd166a75f9818fe16775b4158bffcae5fe0963cdda257bfec195e3eca3ce

          SHA512

          b75362cba18951cb7e9c944deae7ca15061a6b5354d887f2350bff2af2910d4d4ac613db04522d968598d93d698b46108e42223abf34499aabb3864067384c51