Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 11:03

General

  • Target

    e3f75c98e19a9f3a1274d198d32b6e105d6676d9a54d403d65d0e4f034ab5d85.exe

  • Size

    10.9MB

  • MD5

    2ff15fadabf52afbada665fc8f5d7d5d

  • SHA1

    74d19d67cd3d178523f8314108bbf0380bc5219f

  • SHA256

    e3f75c98e19a9f3a1274d198d32b6e105d6676d9a54d403d65d0e4f034ab5d85

  • SHA512

    593edcdbbd7ce4935547ad7314b375fc80af1cc3694a8b4bf7fc7fe07cf76f120e4ab547621411ed4ef1df67916275b139d9dbb3d622fc641f78aaabfd401ae4

  • SSDEEP

    196608:ubGnWW5WySSJ7PbDdh0HtQba8z1sjzkAilU4I4:uKnW6Wy5J7PbDjOQba8psjzyz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3f75c98e19a9f3a1274d198d32b6e105d6676d9a54d403d65d0e4f034ab5d85.exe
    "C:\Users\Admin\AppData\Local\Temp\e3f75c98e19a9f3a1274d198d32b6e105d6676d9a54d403d65d0e4f034ab5d85.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    9KB

    MD5

    b57848ef0e1e016adde56232d2f85845

    SHA1

    06b78e153558cd20c9a0329310698f487ccd9a44

    SHA256

    ec6e338b1d1d60a9172049454c1dbd2c44e14bbd0a61663d6a8fef4b1080036e

    SHA512

    c1b66cef3ecdb156a1bcc4706ffd463e8e7a455c1f0facd1c686fa5aee2f6f1f5598b6de727b49cab048d3b40a9ddfc1d009648eea6df4ab1ea918a06af88489

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    007a7e5447c41812eafaaec88ead559e

    SHA1

    009137522f093a234354c4ad47f354ccee6714c1

    SHA256

    817c0fa9466a0efc608625edcc6d08758e62a967a0e015d73fc55e386bd57aed

    SHA512

    e6f6119c02a0b4f695ac04ddc4847037942bea9222a2c40ea774a0be13601080e681d3377aa844382626c8ace77b9142926ce95176e44767c75f2f454e06bad4