Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 01:39

General

  • Target

    5ddae4cd256a2588ccd2cc21cf35ca2f4e2f18e86119ebafe1afd5f4f6a48514.exe

  • Size

    11.0MB

  • MD5

    7fd482e7d6fcd3d1b4aaa16abb5d488f

  • SHA1

    c190c5d60f9ac030d85a2d30e5430b0d2677182a

  • SHA256

    5ddae4cd256a2588ccd2cc21cf35ca2f4e2f18e86119ebafe1afd5f4f6a48514

  • SHA512

    4b9184621ac76d55d12c1b493f1010b7a87372e078beca25f35d32eb768e62983d7198895afb6ea227400ce68ab2ff4c508afdebf91581eb6e00c33a65a25120

  • SSDEEP

    196608:tEKnmodr76S0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:tNRdCRrDjtLKkOa8ps6puAktIz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ddae4cd256a2588ccd2cc21cf35ca2f4e2f18e86119ebafe1afd5f4f6a48514.exe
    "C:\Users\Admin\AppData\Local\Temp\5ddae4cd256a2588ccd2cc21cf35ca2f4e2f18e86119ebafe1afd5f4f6a48514.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    eb8055afc6cd3be7373ec30ac142cb2f

    SHA1

    41c1b8dc98c33d88a0358baae74e9cfceb2fe310

    SHA256

    e2d5ecfc6ed2b6e57f6417c31a27fd50b9e432626692c53e3478103e6d377f24

    SHA512

    b460be8a5373307250123ee1e617e7d90e6935d0a6eecd4e54b767c1bf815703b3cef4639d6c977094e7c79e5a76d8709d2a5b1fcb3841a0d599ee859a3ae36d

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    7a9b0de3b363d2f7f1aae8951c09f76a

    SHA1

    1e6365f714f3e3c074e4dfb1602be0594f08101f

    SHA256

    175fc828c182c74b99df151bd63f6314a1feab26e08412087d661f436c5d524f

    SHA512

    c37dbc1caea08c2c0c348f015536e58feca23708edf2776999a1fbba53bb50a179533e626efeccb4d2d9499ce43ab4aecec9eb80faf9ea91808be9773ec098b2