Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 12:13

General

  • Target

    aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18.exe

  • Size

    10.0MB

  • MD5

    b1500089c04e47fb9c326903a9745f1f

  • SHA1

    9be5db40099fbd19fa2b515e6407bdeec4fb372e

  • SHA256

    aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18

  • SHA512

    52c2605f10c4a0fb65fa8509040676e4533a39498ce2cca6048922c0ee6a579d2e421c566e57417209d7407b46d0fa516b8b388c365e41e60533492557bf321d

  • SSDEEP

    196608:n4NS0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:nmRrDjtLKkOa8ps6puAktIz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18.exe
    "C:\Users\Admin\AppData\Local\Temp\aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    a7db78e71534f6aba6ab610c6b6c4076

    SHA1

    f63cfc7b8d4a579ed7508a46a95280729ba4769e

    SHA256

    af2bf46c2942ceb43aa65c9ea8662e74034de5526da731696de8d14c2e16cb3f

    SHA512

    acd56145ec56804d12ce39c79a1c6f366292f600192034ea69af4a951e34ce7e3257d0dd6ccd72de73de1be003083881973b4eabf2dd34ffe6c072ffa71c33b2

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    2KB

    MD5

    e0d76a47f90cc8f73758db7e53f3ad25

    SHA1

    da65d7eb38b4ad96d3f9a521eaa9b7dfc3071b53

    SHA256

    457227e4637cfb6fc72961b228a89611cbb491e6bd49e49358148548d3cf12fd

    SHA512

    8c14d6d08f5208acaf650b0fc77568cb5d6b304f80759edb56c9ca19df419c0e67bdca6ed9eafe06314f8aaee60b9186416098794f6a5349cb55ffc731605402

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    418e9de17801e76f0d62d1a7d28afd53

    SHA1

    2dcf4a5c897e7e47b68780d9b07971ceae7e6e23

    SHA256

    188b211e288d4767bac6380f48b8abe9540ebd9990bf400bca560929889d7b22

    SHA512

    c600ffef1cd6b7f5209c1cc54877b9ad991c98848ea266d03e01aca98ebe49c4e5648253ce04e4d7e2a22f068d60a3f4dfcdeebf93cae76e9c075aa8e80ecb96