Analysis

  • max time kernel
    124s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230824-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/08/2023, 22:04

General

  • Target

    b1fb7acb9dbe8758e1c1c81a1bccafd6926a999283ec3fcc8920fcd1a3a175a6.exe

  • Size

    4.5MB

  • MD5

    f7bcd2fa856257fc8886d228c567f3dc

  • SHA1

    315619059a692396aa6843451cf6105c8890cfbb

  • SHA256

    b1fb7acb9dbe8758e1c1c81a1bccafd6926a999283ec3fcc8920fcd1a3a175a6

  • SHA512

    7638e1ad0b10b25f032b6939580c31c55dd1d983296a5e4b8a24af1305fd53f8965cf291a490aed264a13d54d51df126ba4a147506e9095c87af337fb987aab6

  • SSDEEP

    98304:B9xEpja9gwFK2JcwtTwPAHqx+gKdzOJDb4v+:6p3tawN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1fb7acb9dbe8758e1c1c81a1bccafd6926a999283ec3fcc8920fcd1a3a175a6.exe
    "C:\Users\Admin\AppData\Local\Temp\b1fb7acb9dbe8758e1c1c81a1bccafd6926a999283ec3fcc8920fcd1a3a175a6.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3880

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          a1451267ceca403ac937c6a3ca573e6a

          SHA1

          5938185fcd819592e6ff7ff2d16664ab927cd3e4

          SHA256

          de828d83769f85ea82d125b6090529382dafb07047573d0a3776ac8b9eb5e38b

          SHA512

          c2b9e8511b7e798f5afbd3274b7d965349dce5a13067a3b19683c83160b582a532a683dfe871a6fc6b78d5a5cf5c239da7b38c3d6ea12b1d2037af0ab5cbebf9

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          a1451267ceca403ac937c6a3ca573e6a

          SHA1

          5938185fcd819592e6ff7ff2d16664ab927cd3e4

          SHA256

          de828d83769f85ea82d125b6090529382dafb07047573d0a3776ac8b9eb5e38b

          SHA512

          c2b9e8511b7e798f5afbd3274b7d965349dce5a13067a3b19683c83160b582a532a683dfe871a6fc6b78d5a5cf5c239da7b38c3d6ea12b1d2037af0ab5cbebf9

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          1c9e2a53368e0a13bc22c44dfa07b3e9

          SHA1

          cbd105a786a785f9dd8ae2019015813fe6947e19

          SHA256

          c922b9aa9a0c29d5d94583b6e0bb8f5a0e4c0214de9fab2f804f8b893b09ed45

          SHA512

          f787944a6b1463bf754137879bd10ed82047b4f94dd1f287c05ac4ebf73bc2bc29852ec5b68d8eab6803161062a5e0a582830a7c3606fc67044bebec7e0a7a1f