Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 17:31

General

  • Target

    7622a091d3d371390e6f19db8ebcb40fe29f40da230269154c7602b7ebe98c9c.exe

  • Size

    10.8MB

  • MD5

    0295e27d613a16a8e196a3121ff3ea40

  • SHA1

    56c6c199a46f2eea96a1c2bba6aac61e05baf2bd

  • SHA256

    7622a091d3d371390e6f19db8ebcb40fe29f40da230269154c7602b7ebe98c9c

  • SHA512

    1f9f41421cba2cef724c9e1c4d6fac14881f4e56cc1b5453b0787e5cbdfd61de5d95a254e445a012932059838804501ca22d1856a67867da069e500bb0e8f4da

  • SSDEEP

    196608:ylWW9DrFSSJ7PbDdh0HtQba8z1sjzkAilU4I4:ylWO5J7PbDjOQba8psjzyz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7622a091d3d371390e6f19db8ebcb40fe29f40da230269154c7602b7ebe98c9c.exe
    "C:\Users\Admin\AppData\Local\Temp\7622a091d3d371390e6f19db8ebcb40fe29f40da230269154c7602b7ebe98c9c.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    d355e33c8cdf4b3d0d2c1c9ac22d6775

    SHA1

    fbb72f1b52b942190e50ff6e503fc64df9e6991d

    SHA256

    996b640a7ac927dec288dd5c3b2df8ef209469a43023e7e909a1c7fbe699b992

    SHA512

    848faa83af2b02c8dd7357fe97b22e5c568f6e2fb690209441f6fe3ba6ffbd29be44b867746df3fc956b453b8f35c5110e27b1fae8dc92c275a053fd34483823

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    0969fd9496979f063c765ec23626ddd2

    SHA1

    e69521de627bc4a4b8dbe8a51a5aa65b48bd921b

    SHA256

    84927a384a1ff8fb4ce935a500c6a844b6fb0852adc2975f4cec4694534db3ca

    SHA512

    b6aab1363624b1749f8a5b0c70aa88d1fd0723e78f044ab14f7ac460c4bf915a2f42aed2c0093dcad5663c0afd67c22d1775b5322d9eb83d54f77f763d90202c