Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2024 20:17

General

  • Target

    47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c.exe

  • Size

    11.3MB

  • MD5

    27a48526ed77894b1baba77bc78ab7a8

  • SHA1

    e5e7f8764616f0541fc7bbf3d5ebcf3cbf6d0165

  • SHA256

    47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c

  • SHA512

    fee891ed36f6787d7268331dfd793340e109a2988cc22693a5013af890840d5b01bbc6d3760bd20942dc088d4c716fd268ffe05b425dc3ac194a6d0db6297468

  • SSDEEP

    196608:RXFGPpySVf+6b9oDdh0qTRxa8z1sULDSe9a+5crvT9YqS4lU4I4:RXVuf+6poDjBTRxa8psYSUa+arvSP0z

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c.exe
    "C:\Users\Admin\AppData\Local\Temp\47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    6KB

    MD5

    3675e532ff5792c0e573de491a0aa034

    SHA1

    89ebe270a4e46314b57ed8d45adfea694bb0cc7d

    SHA256

    8c1ee84ca804350b12c1261cb40adb3cd3080914c896189488665a1ac3f345a2

    SHA512

    98f8c5dc4b60e4946363c5d62b7eb6c7493cd7c387b33546ddc067887b46d108327cb67fe64dc8780d9dc99347abf63128645bc4b048114f73b7bdb9cdb9a094

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    196a114009493fc23e46439790b2272b

    SHA1

    dbb71982d8e5f5045b1fbbd64a5dcc4943e1d4a0

    SHA256

    5bc3f4803729cf6216d4690a66865261b526eb2526e319ed057a50fe3db95f60

    SHA512

    cc8c070173da35e9ef42e247681a08ec44024dbfccc049f96bd8afb1862497a5e3a6f658a63c1e1465fa68b339fcb304acb7281c4a4912a338c74a396db633b0