Analysis

  • max time kernel
    141s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 13:26

General

  • Target

    DownLite.exe

  • Size

    2.1MB

  • MD5

    84d44cc04348df5226b733eba1b64eb6

  • SHA1

    3cc6d1a7aa6dcccf665c0c777af596d551fd953a

  • SHA256

    7126b3a28108726ee7d07024bce3611ed2d68f7fe75494124a04b9314488e605

  • SHA512

    40f11d74b158188b5d948d014ee82d70bd1b4a78710d7e596f961dd13fe212e6435ce2069ff4f483be3d8d23f8bf4fe478264b1c90f840660fcf4f7e0ded24b5

  • SSDEEP

    49152:0gSxAEDE727h0VKMPh3UWUZQLamNg5/U6l:Q82zMPh3bUqamWc6l

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 62 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DownLite.exe
    "C:\Users\Admin\AppData\Local\Temp\DownLite.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.java.com/getjava/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5fcce96d2a6a56ec6daa86bf8ab70a40

    SHA1

    f51c4d90bfc5dcd9fbfea1296bae648941c7826d

    SHA256

    6de15bf0134431cb8a7ea365d883e8fe12ac3deb32b83088cfce31fd8cbf409a

    SHA512

    44545dcfaa244bc86ccd12a2a71573d5583d0e7ad56533e43cf4de92e82b8b284c35fd83ddfb8074e4326e46406903b887d5e3a67a5e11db949b151bfe70dd5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1adac5de01981c6f74778d82db5e790

    SHA1

    be199e2ab684d68f709d259f2eec328393cf080e

    SHA256

    71b963009ed3c8a8e066fcde318ea9265fecba7fdc6ec0350e7d46e6e33f2913

    SHA512

    392724d7f74fdc77b3702905f69ad54f767696869b6a025fd5fbce35d975d8ab4ec9a0cc7f047fd02f96ed8c5041272b78b2345d6ffa07838880c16252492831

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d4e91a2dabfca426208190d86d696a7

    SHA1

    af75050c80e9153785b1ebe607a6a13a3797dcd2

    SHA256

    50ff37d5098853f5815f6c50279cdef648abfd946a4bf59d521b4b6ea18baae8

    SHA512

    e927f94ea66741a1bdd15229ecc79ae3f94ae768aed62427772c880114f87f5288e52e7572e8fe0fdeb2c5e64f45ace2e835b4ad5e1797c91784dce2692b1a80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f45039a46ad86f58bd0d268d2deb8707

    SHA1

    54ef7135cd844b7bc480850e0905f18381611c7e

    SHA256

    4606df259c2ac49caa6ff99c694dddb276325f1a01df67e566089a66d55414c9

    SHA512

    80f2dae3c22e332b107c76bc4e7e53efef17a61b38a757f5631221df7cd547e14d6ef68c00eb466e10302543e3e36a88c0907db959194d7431f96df3ef656eb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c129866a8491fe97c8c83a3c38d0dca0

    SHA1

    8880c2eef390cd733844bd552bea997316f181d4

    SHA256

    c20615a9b62786662d118feb3314108f797c3563dac40b1f96bffc822a058c67

    SHA512

    ccf4b2bed672b4edca2529e20b688013152bced61a2e3390ed9d0dcc961a2294b7c54c917903958ed708ca380d4cc1aadbf9a65c3e68e76fa6c0622e244572d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a06611d188d172c9752664afc9e6524e

    SHA1

    30236cc6d1db47f2354170eee7b952b4cfc4f27b

    SHA256

    5e7e41ebb662f48507762952cad8b8509322e1c771797fcce7adf8f54b7daef1

    SHA512

    7415c05932dd2e1bbcc7a85e78554b4762b1f5736e77f55d98e1b4298fe5f3ee0e25ffbf7f2d9cfc63f97b0319b71e4c8d56458d23273fe57952c48405a75f35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce37f8ad9968ba9de2a6c69714428d48

    SHA1

    59d64923c5a0c531d3117d41779a1849ff83be7e

    SHA256

    2d0f1b9154bec4cf22b06e85d4bb52790a2f2a9ea79f8d951179414d46856d96

    SHA512

    598b6c180937efe7a724648f40aaa165c87de896564ad7310e176a916669c60e9ea67b70c7a9fe89892738ec805c0a280c8bd2f40f99c40aff53c442c50c35d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91dcdb7608899a5eb63a9c1baa959a26

    SHA1

    ea71fde25138ae5d90b15e6feeb2d4d97e924444

    SHA256

    678d67bb35ead732ca6c93e93c4aee93e0a395f578fa52cf64f214069105a71d

    SHA512

    f27483ab607f67d90b7e5aa2fd5dc5266c643d0c9a030ba48e1b4694a21d66bc8f7794efbe2f0d314f1d0f0a3021462db38a9bd1e48c7fe5b9d03eca28dfefeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94947942ec871954cda88d12f5d0eb73

    SHA1

    f44aa28258568efd8cf61e41ae565e2a256986a5

    SHA256

    9b94f2ee4411927be54d67ec540598c599c94bf57442c8f361753f7f8b77385a

    SHA512

    427c9e623e1f3e6bc91cdeadb2a50fbab6c2a087c2c32cfe64a8228080340948275e6427b5315a8bbf2f955e8b1a437a4ffedff8fb1d572a30905e1d9659e0ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6e71a0e06846e98da4b2cad81049407

    SHA1

    052b4da6ddb8fe96826bbb411f220a2a12b7a31c

    SHA256

    288ed562b20e4f8c650e3c0acbe7672af9254edb69ab4e4d23e9c5e1b037f350

    SHA512

    06334f66274c7bf11c21281b09b6cb234e054298673cb1e9206a7682146ee24c51b127df5c2eef3971a6447a49dee4105610bb718dec299a9cb3fa0a3a97e304

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd129c8ee1bdc1336b7533c5346cf8d2

    SHA1

    ab49689ffa4c46c0521728bcafa1cdf23ecd6084

    SHA256

    3d536a413608052069683e7103da72ce90f329d9674f540ad344720246c2d562

    SHA512

    29b82ed2e1e8aacf60190b9120ee3a713e399b0f70f8c6a93aa5f90e2fdf303a7ddeae98882e82f66a16605b644499e0282ba27a84f1460b70c98c6d843ce618

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bd6ccd3d0388d81269d295efe52e35d

    SHA1

    5aa2f2e4578e3f4253c536abfb7b1a271d249ee1

    SHA256

    27aa63546a8c8b1483f34f93e6d32e29a8de2413b2080a24f63166a512f18765

    SHA512

    809d8faf3526ad3f146dad1a053bb48f96f2c12bef075068d501cc834248c1358360d907a08ec034562728152ffa3f7e3b635bd6d79c377f8bf92951c5fe102d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de760794ebd22a6d4dfa36617529f582

    SHA1

    d37638cca51e468ccc6727bacccbc0d2f64f6df2

    SHA256

    48438d27dfb08e4961fc6834ad33f3bb4eee70e04d85c982e7055fbc54c1e4d2

    SHA512

    193e8b4b57db25170fc6632623dc6068ace3589846febfc7e1badc6675aed99da14719f595544a70f4e39986c6dfbd5e2cb2b1d5d45ca7bc566c5745f99a56c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b8dd288b10c3d251dc21597ef8d36a3

    SHA1

    59a4db14c78410d9fe5d9c89be92a32ba397b0dc

    SHA256

    8c78704ceffbad5be550134a7d8764f9e2aba9e070430e0dad2b2a0e910e98fe

    SHA512

    edf9248658ba3724a77f61aae0dbb2569571bb590e4c30ce95e31b01a036acaf0e718292ec31e283ba342b957283e89e52275061fc3fee881b7cf2f6a6b0e697

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6638df3cd0e966e015c145f549fa4f67

    SHA1

    8b4d4549913da22b05ae1e97c38af16c6d32c29e

    SHA256

    5a42c4b4772399f63b72188d6d7e60c2aea582b4d79e1d029978e8c53b3d5ba4

    SHA512

    76c2bb0c6ac3a0612271f46a19092ad6a769a20be165b146aa6a1b3cbf45407dd0ec32cd656a703ac00eb1ab7dfb36802c0766f836b857721843a57284c9837c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d41ee9efb960ed9062d5a44a17699385

    SHA1

    224f522be4f3bd10a4f16d3f85aab8229105db13

    SHA256

    440abc27d8198f8299746bd16948df50945eb253c2b4686b5bfde59e4856f866

    SHA512

    b7f5200656fd23bce3c46c96c338fb63c67bd0668e8e851ce551aec768a2c4a7f14b023d4a3e14cf3d03d4941550f195a01d7da3b7d4685ff34268d7a290702d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    faf35b4e8ea6179947326e80602ece01

    SHA1

    a9813cc1f41323e10d8009ea0b002fd66765cd7a

    SHA256

    ecfc1d100149a18d2f0243f50155b9f4c2c3d4cce54d18649df7e38aee844d4a

    SHA512

    ae0892d66a27d1d20c4ee3e9e95bde389480de0114ef56cdc458de7c393c4d483db601f4e6f0a33162ea5e301d49cfa7788f65117b97f189eb7ed2e11b704558

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    831241fd1efcdc40cbceb01caf69cc44

    SHA1

    7642c34a55b76e7245d58251b0ccda4ff3c79a06

    SHA256

    e5aee3782877b3db7ce19ab7a0df2548c6eda9b1720c7dbda315b0c71e5f401d

    SHA512

    b1a9898847cdce8fa1952b98661b87de5daf183e0ad80dcdef0a0e58f9e72ccce088efa1d197d2ba61bc70b555e49b555e5c26c5e373ef30befe307c07db9f32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ea18e25a1652a65d284f13dcbca94d3

    SHA1

    9936d5f97422232b3a7dcbb31fbd68e2c59d1815

    SHA256

    f2c188c9ca7eec1de14f0f62695de848cf00ff4a1c631ea85b5128b9edae7021

    SHA512

    d3c38938cb18079a85b5941201c55f3fab29169ff312391fee8f0803d19d63d121298a1b7a724e9cb72dece3c959958a571ed314136086a8b6702f3dc0b6d503

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8d91af713004844c1d3f9dd546d51ee

    SHA1

    6b16195813fdf38cd64c0ec7265557a95d59398c

    SHA256

    b1e40dc547924a6e7fd58fa22e33eddda7eefb4297174f9944c21bc45fe77833

    SHA512

    4c9417be49724f39018cfc4ef386099ebe025eb50f9ee134a0cff692111d91497a407be5cea5a85e644edd28b2848ac70d5a3271e60a69268d764bbf582eceb7

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\4UB2C496\www.java[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\melo7gx\imagestore.dat

    Filesize

    1KB

    MD5

    4fa8fa11f079337e56783063dba4a260

    SHA1

    3bccbd279ab66d90adac370a92c8e91a283a9926

    SHA256

    ab8dcd1200b54ffe5039e4d1fe31be82b02893de49f79e03c4c992b83326213c

    SHA512

    789c97d267bc590bcd3f9428375d3c433162f69e272c968c14aa2d061c46dca9f20ba95374cc5fca1369793fe08f33ada6ffd82da88610d28fe477ed012e0b70

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\favicon[1].ico

    Filesize

    1KB

    MD5

    8e39f067cc4f41898ef342843171d58a

    SHA1

    ab19e81ce8ccb35b81bf2600d85c659e78e5c880

    SHA256

    872bad18b566b0833d6b496477daab46763cf8bdec342d34ac310c3ac045cefd

    SHA512

    47cd7f4ce8fcf0fc56b6ffe50450c8c5f71e3c379ecfcfd488d904d85ed90b4a8dafa335d0e9ca92e85b02b7111c9d75205d12073253eed681868e2a46c64890

  • C:\Users\Admin\AppData\Local\Temp\CabB211.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB224.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2772-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2772-34-0x0000000000400000-0x000000000062F000-memory.dmp

    Filesize

    2.2MB

  • memory/2772-551-0x0000000000400000-0x000000000062F000-memory.dmp

    Filesize

    2.2MB