Analysis

  • max time kernel
    121s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 11:55

General

  • Target

    8bbc1f599ab3e9a12b37648c79b785072be32fdeac096691c83b607ca013c3b0.exe

  • Size

    10.8MB

  • MD5

    22b3954667b1b7a65bcb35620c6d3450

  • SHA1

    d353a4020bec2845d4b8745395811b25dc73a905

  • SHA256

    8bbc1f599ab3e9a12b37648c79b785072be32fdeac096691c83b607ca013c3b0

  • SHA512

    09210523d5431fd6f93a3a41617bbdfc1d4b306af9d9b134b8b4645eb0da5af8461d29517638a46588b8003ac4e1f49606b34735bae4e9d2f7baca1b084f4d9c

  • SSDEEP

    196608:ylWW9DrFSSJ7PbDdh0HtQba8z1sjzkAilU4I4:ylWO5J7PbDjOQba8psjzyz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bbc1f599ab3e9a12b37648c79b785072be32fdeac096691c83b607ca013c3b0.exe
    "C:\Users\Admin\AppData\Local\Temp\8bbc1f599ab3e9a12b37648c79b785072be32fdeac096691c83b607ca013c3b0.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab8A85.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    72609184c1e2ddc40532d8e2c8c0f6c9

    SHA1

    6d0ffcd8e9cdb7e2e1cbaa3d18500c9a5becc2c4

    SHA256

    f990e19509bb24b0e6422a2b69c45704835b5d0ee9cb83346cb1de4d90f822f7

    SHA512

    17c6ea9e102e9782322bb13fbc5dd4aee78dfd5651aea8496e299441c5496db1da5db1b11b3330f92878e77385692b2e2ccac6ae4459818c8d34a213af5ac797

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    b47250b80ac588d6a44efaf4288f7c44

    SHA1

    0575c3832f30568fc21193b6ff461221661aaf95

    SHA256

    d98c0cbeffa539d66acbfe7fddde3829fadc747cb2855f2d3f6b5cd5bd26c32a

    SHA512

    61f4beaeb2390a83fa7c1bda5c669eb6792ed3097d3ebbc49b37d7888f3764b8a03c4c7081dadf32273f1e0ed5776e807678e51562e842ee0ef55e99e0e23ca7