Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 15:30

General

  • Target

    25556767f3d73cabfb87f75723b9ec1c0ac21d815952ef4eadf047ff4a4e9681.exe

  • Size

    9.9MB

  • MD5

    4a3d213e89434076fcc8f1daef34a21b

  • SHA1

    456605215f9bd945ebce309f4a356c675edec130

  • SHA256

    25556767f3d73cabfb87f75723b9ec1c0ac21d815952ef4eadf047ff4a4e9681

  • SHA512

    063b20cd356a53801b8084f8319313cbc1a4b327de13dbc93c2369abb8142d16d5b66b974a1cdfe480fd61ae1394551bcb8e99128c448b0179f7451fa0e6c2b4

  • SSDEEP

    196608:NfS0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:NfRrDjtLKkOa8ps6puAktIz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25556767f3d73cabfb87f75723b9ec1c0ac21d815952ef4eadf047ff4a4e9681.exe
    "C:\Users\Admin\AppData\Local\Temp\25556767f3d73cabfb87f75723b9ec1c0ac21d815952ef4eadf047ff4a4e9681.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    04c035a0a1756648a5f5fa92206ef0c5

    SHA1

    8c65a4c7d9eff45a97ef826ebe8bbbce95419962

    SHA256

    ab56674aee5377575fbdcb7a3a3a071324203a9fb036c5bf3993ae0f15eb2460

    SHA512

    0b82bad01ef3c8b133670f23e0f5f9724cd7b388eaa4d38114f6f323dcb3a20d842785ab50183b916df7f85decf4d1620fe82424ee0fa72b003c387f4552bec5

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    3df4e1c3614e007a8038987f7c0c5da0

    SHA1

    fee7b97e3ca626773ad7032679c5d33bfda35fe9

    SHA256

    792cb90630574556b9d572966b9a85a7ae80db73a51d5baec9f019529c8f990a

    SHA512

    fb4ac1d9452412a96949610019f1ac0374039dfde11a7f1daf7cbee786d34c406378a04959e1e408beefe9d200e33eefe29380aabb3b68fa678ba682510494c3