Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 19:05

General

  • Target

    39b2de7164b1cab0704ffbf5ef8597d2c092a5aeca09b7242e43973055418bc3.exe

  • Size

    10.3MB

  • MD5

    18202dfb8ee4bd515268a34c040bfd50

  • SHA1

    6fc24510c610109daf7872d147e0fb7f41eba446

  • SHA256

    39b2de7164b1cab0704ffbf5ef8597d2c092a5aeca09b7242e43973055418bc3

  • SHA512

    e42031dd2530831d7d4e23bb904cd47cf34766a1693bd85bd3a57309adb790e344469dc5b4893039b6abbe4ee2da3a6323a99119ade4c172fe2320cfdef3b47a

  • SSDEEP

    196608:dXHSVf+6b9oDdh0qTRxa8z1sULDSe9a+5crvT9YqS4lU4I4:dXHuf+6poDjBTRxa8psYSUa+arvSP0z

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39b2de7164b1cab0704ffbf5ef8597d2c092a5aeca09b7242e43973055418bc3.exe
    "C:\Users\Admin\AppData\Local\Temp\39b2de7164b1cab0704ffbf5ef8597d2c092a5aeca09b7242e43973055418bc3.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    5f7d23320f0db3a3efe9ace7682fd0eb

    SHA1

    b8d662eb1eba9dcc0cb75b34162dd965bc401079

    SHA256

    234859ea59279a3fde4462b8696e07299da29c535fbe9ff6d5bf0d742e67ed26

    SHA512

    406e76c84c4798235cd7fa49139c327df002b0e2984c9bb8f1a0a50fb9299fb6d7dba451b6b3df179c91697e17358515f9fb3bccb5f5ade589db19d928096409

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    499ce2aac68f072c250324f597bbd87d

    SHA1

    fff3089a26e26df526c13dc3e368846caf824ab8

    SHA256

    0422f75c6ea3ddb60bdf207745a40cbced3504baed9d42a3cbf9781bfebee6a8

    SHA512

    ac2fe8515853a87ce07e7b6373e90ad6ba5340dce8c7034f7d46a522a281cd816ba661528cd0ac95333705b71a365e19f5c42adb0524cfb708dc0bf9154af9a4