Analysis

  • max time kernel
    122s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 10:13

General

  • Target

    bc2803f2b24bfd7f4e2e971323d950c2d7daa7ea9d0f1061d40d17a02afeaf1e.exe

  • Size

    11.0MB

  • MD5

    b15b78cc6cea99cc60a1e6c7f6228e2a

  • SHA1

    7b1cfdab104383265ecd336320f3cfcd8678920b

  • SHA256

    bc2803f2b24bfd7f4e2e971323d950c2d7daa7ea9d0f1061d40d17a02afeaf1e

  • SHA512

    648b97d03d27d070f34bf8ec2c521a7a7b839060e2898507190cf241dbcb67288986bac2e842bcb59a898f6083cc95d517bdae38a87b9def98b0141d5ac57c68

  • SSDEEP

    196608:J1WWWNNAsS0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:J1WdAsRrDjtLKkOa8ps6puAktIz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc2803f2b24bfd7f4e2e971323d950c2d7daa7ea9d0f1061d40d17a02afeaf1e.exe
    "C:\Users\Admin\AppData\Local\Temp\bc2803f2b24bfd7f4e2e971323d950c2d7daa7ea9d0f1061d40d17a02afeaf1e.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2104

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          58a2af0ced5b43187834195a442ace34

          SHA1

          c30ca3cc021cc498ca21fa82a8c5c4245a17dc87

          SHA256

          ed87d91cf4046fba0123162c786ae8ee3eb144124a268ef733c29d3e4771a747

          SHA512

          52ade396339768ebe43a72cdbe6e1326916e08c33c088df89762f141ae0a6ba94a1312a44c090ea44f0628cf6eabc09f4fd65131fc3bb1d4bbb8aec84941bca0

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          9e9f41bc43434d29c0f506d819cf1d0c

          SHA1

          e7ab86aa2c69acfa682643fb998a45b51562fce6

          SHA256

          95e8d446d74c73274ec584848e61830e995636ef20cdca71cd85f60d2524fb21

          SHA512

          626b305d08f6ffe99a273627a2783bc5ea79f23d2abebb25c80d3ff3dfb1ef621f3730255c65a033f35e9e56296da52f17ade03013256c81f5df3e04288899b7