Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2023, 11:34

General

  • Target

    f7561c0bd859ad8a1dd9a74b6e0df7890966fce275f4d2c1072d9b5e89eaf84d.exe

  • Size

    3.7MB

  • MD5

    09fca61035644f3c8bd0676a329806e1

  • SHA1

    f7dc58f82331f6d10d9be686f257c8a19c84ba71

  • SHA256

    f7561c0bd859ad8a1dd9a74b6e0df7890966fce275f4d2c1072d9b5e89eaf84d

  • SHA512

    a33c96e6aded197e09723ff716d4936acf914b47dc6e5fb1aeca41f875d5744fb8afeef81f62c9095e5892ff99f9b4977d040b5f73ecdbb9561400380d55a7ae

  • SSDEEP

    49152:d6x/NP5OJ7noS95X6mXfKezXJB+r5u8QeKxFOJxdb4vZKVO7:Udh5q7noS9h6mvDeKdzOJDb4v+O7

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7561c0bd859ad8a1dd9a74b6e0df7890966fce275f4d2c1072d9b5e89eaf84d.exe
    "C:\Users\Admin\AppData\Local\Temp\f7561c0bd859ad8a1dd9a74b6e0df7890966fce275f4d2c1072d9b5e89eaf84d.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4800

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    ff19c21868a46ae7e8012ff26133e02a

    SHA1

    3be2372cba7da7bcac9aac8dce3e9c36991af41c

    SHA256

    bc3a4fd083359dd393770c8dc58bc25fad0c60c9e034c75fd9ac3b427c6cb092

    SHA512

    fda2c3cf832c53624004973f7f28ef0afd0132af5f26a507139c40ec741ecfd3f50b78e1e108c619c1b9eb12dd579352c57c60fe5d78c6b4d9af22848fc8446d

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    ff19c21868a46ae7e8012ff26133e02a

    SHA1

    3be2372cba7da7bcac9aac8dce3e9c36991af41c

    SHA256

    bc3a4fd083359dd393770c8dc58bc25fad0c60c9e034c75fd9ac3b427c6cb092

    SHA512

    fda2c3cf832c53624004973f7f28ef0afd0132af5f26a507139c40ec741ecfd3f50b78e1e108c619c1b9eb12dd579352c57c60fe5d78c6b4d9af22848fc8446d

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    0d38854abd808ec9a5466c94064a32ca

    SHA1

    fc4b20e722d59ccdb27bd7241415801bd9a9dcd4

    SHA256

    62ac137bc2c2d958aace1208bf5ac502f80046711cb9d09842555d29f5122788

    SHA512

    f700a32ce2eacd078518a25b3411002594edb8be8f9d08aa270dda5577ed0f229e38639b18c372070f99368760b57d56a61739a8d265be57ebdbf853b9357eb2