Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 15:50

General

  • Target

    6a514affe900a8565e07453713a4a27e914fe00d1b721cb5641014152b3f28a2.exe

  • Size

    10.9MB

  • MD5

    5b481af97470a11f4ef4e08ae1c76fef

  • SHA1

    fe5ec035a980575b29697b1adb7400a7f7033516

  • SHA256

    6a514affe900a8565e07453713a4a27e914fe00d1b721cb5641014152b3f28a2

  • SHA512

    660c971a22e145c65478e77aa1e1a8e295bebe10bda4d4c10b74dfe04716e5562c7f48e0ccea097e42b57793fc741b3e6fdc7d5a3ed2eb3d4fa8ecdb477501de

  • SSDEEP

    196608:ubGnWW5WySSJ7PbDdh0HtQba8z1sjzkAilU4I4:uKnW6Wy5J7PbDjOQba8psjzyz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a514affe900a8565e07453713a4a27e914fe00d1b721cb5641014152b3f28a2.exe
    "C:\Users\Admin\AppData\Local\Temp\6a514affe900a8565e07453713a4a27e914fe00d1b721cb5641014152b3f28a2.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2472

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          6KB

          MD5

          5f72c11807b040525d7bfbd000273cd8

          SHA1

          916929327e83ff94496d4411ecbe45155f6caad1

          SHA256

          95d01cd34667eeec9253b4af12ee557e09254645bd4d26b9c899a62e7e473aca

          SHA512

          5f8287d6bce9ca3db1feefa1cb59430c1dfeb63d8f9265e136aebe0c262d6116b33a615db581a1ce5d999b6c539d5bd4c8ec741317de4712e6d703fa749086e2

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          7487a5891868ccacf3ef54e7c136bc7b

          SHA1

          c499a93a1c03124af4c27d4b7f912790814b59bc

          SHA256

          d5c1bc654bb56adad6dff489e19d40bd4fa57f3ac8842737e19713eab3dc2ed1

          SHA512

          bf32c06cf6b5f920c02c0868ec067f79c7823d87098978e29917274060c804608b13d123675bf244895d96fc2e0cee629fc422188d5b344dc169464247b9bfb8