Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 11:52

General

  • Target

    9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9.exe

  • Size

    7.9MB

  • MD5

    ab84280f6d135ec84688e770e29fff86

  • SHA1

    9f1b645c0729b68b502d3e454fb754f8f2b6314f

  • SHA256

    9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9

  • SHA512

    5761940f20e255c9d7d7a71a5861d551f8ba01d644cc4dfc37c5bb5a1ee616d17f098ca6c9a926f9c907bb20429528072311352a18682c1e4592d0be8a82b2a9

  • SSDEEP

    98304:Xg49ZaYwsmJdj9PfPHRCjNTEY9xFUkcVwNSHfbv/kOIhThw6Q1f+hl/hjY4+iafD:XgP34NTx9Pe20/zkOiu1f+79YRck

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9.exe
    "C:\Users\Admin\AppData\Local\Temp\9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    11d6af45a74d3ce55c8b0859ac9d5008

    SHA1

    4303f39b0780b6df2ddf320f1df462b5653f0f9f

    SHA256

    272017bb06824b9a099483df48238afe45a85c049d3f9e0877345059783ff707

    SHA512

    8351cb7a27f0b5c5179e1cea96da1e5f4fe20c6e60f063d89273b41dcedf0e5893610e6d7e819532ad536c4fafcb84ae4d5e3857108e8e12af6ea54c1d442c08

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    e47dcc726dc6158f6e03cfafd202d315

    SHA1

    269952b4a0868c2d8e9ca47a42b295ab589dcd44

    SHA256

    7115e617eb810b5737ef4edea98b23155022843937c794d43da44e402f770a30

    SHA512

    aa1d41fb0d78a48d19426356464bdda5ae5ba5051e20af1fb330a63d324a90b6888b93e0f3a780389dac9cb7e5f0f8be79228acb4f8d43a4cfac74c76bc14cd5