Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 14:13

General

  • Target

    d5ded1777972de47b949c19dfddd4c0441aebc940045ac942efc8002a5bbcaae.exe

  • Size

    11.0MB

  • MD5

    064b70d804cba1229b245a75015ac37f

  • SHA1

    ea7bf47c7e95f25d7e66d51207f9fb4807cd9e26

  • SHA256

    d5ded1777972de47b949c19dfddd4c0441aebc940045ac942efc8002a5bbcaae

  • SHA512

    74bae79ae35194003e2e306a68ab5eb37ffc91f10688ef30481141b2841288314f8177f08fda7fee1aa4dd370efb49459e8276b7dddd316245ab75a96663bf6e

  • SSDEEP

    196608:5lAWWOUJYS0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:56WtUJYRrDjtLKkOa8ps6puAktIz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5ded1777972de47b949c19dfddd4c0441aebc940045ac942efc8002a5bbcaae.exe
    "C:\Users\Admin\AppData\Local\Temp\d5ded1777972de47b949c19dfddd4c0441aebc940045ac942efc8002a5bbcaae.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    13KB

    MD5

    68bdd8c3077ca6a507026d6f2ecb5e39

    SHA1

    1a615a20c930148d467a7cb1e782072cd4c73b1a

    SHA256

    b31123fab4b2cdba6fc5b29dd653de6be57dcb055e2db39792e23d85ff4c585f

    SHA512

    d5bbded00a6c24c59776ad4e3c69b8a8051c9faa2a5d9fd8860e381b0c2c6f14802db3949539343e184a3728ceedb1ae749ad243629530ea4ddb5773bb7a0f7c

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    a3bace1dde9313a6ffeb4f0e5424d796

    SHA1

    1aa66c10cd9c56d4905098e509e305187e11201a

    SHA256

    56bd4853b3ad2ba9ce3db7112fa09b98fb2dab18f4b7236f0a8a29d26d9802c4

    SHA512

    28947e006ac85566e2c2729d432275750076a8e1bb151d09b0f276808f8288fc4856ae624f4ce0800212b7840b62784fa9395c0cc40153e14b8edf8ded96449e