Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2023, 01:21

General

  • Target

    6ee60b23f4bb05dbc37273d0346c6ef2182f9db35fcb5d2b808459812072b504.exe

  • Size

    4.5MB

  • MD5

    26a143057d3525a10373c15278aca979

  • SHA1

    63c91319aa57f64c16c673c7b57a3e78a19a8314

  • SHA256

    6ee60b23f4bb05dbc37273d0346c6ef2182f9db35fcb5d2b808459812072b504

  • SHA512

    3cdccf8512b19c50bd042ca4d98658175ba8b79997c522c0e640506ef2bcb5d5d40a176fdb222dc85ecdb4cd585a0d6c69c285684bdb0a0c466965fd7761f18d

  • SSDEEP

    98304:B9xEpja9gwFK2JcwtTwPAHqx+gKdzOJDb4v+:6p3tawN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ee60b23f4bb05dbc37273d0346c6ef2182f9db35fcb5d2b808459812072b504.exe
    "C:\Users\Admin\AppData\Local\Temp\6ee60b23f4bb05dbc37273d0346c6ef2182f9db35fcb5d2b808459812072b504.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:224

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          1KB

          MD5

          e08911720a626f22f734b7eab805b9dc

          SHA1

          a407a61feab930b7ad9afecb61d94eae0d0048e6

          SHA256

          2805130001fc8e49cc005ed6e2636992559909c333e8a537d79f867aff827f12

          SHA512

          1c9b7d6d5ef701acaf2247fae3fcbe00250163bdd81c7aff64939cc95147bd6136b7370b164bb2dcf48da37f4b8e2ab841e296db4c060c22af10437d0b55967f

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          6KB

          MD5

          f1d93a681cf57055da2386bf8c8159c3

          SHA1

          8ddf34fdd79406c2f8f256eaf18954395d9241a7

          SHA256

          4f444d42a7d594b082f8e5febd9bf97705b2dfbaf4121f1156d2b70f5d43dc3c

          SHA512

          b0246d1e1472d26b11474dc0e0eb7965e5935720f0adeef83c8c73350e624c6b407688875a45eee2a4acfb38de56b35d081966452a2044d3e2f5da1ea3f04da9

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          01b90b89254d20b89fa08faacf509352

          SHA1

          5672536f51feb6cc296f8738adfc73fdd32a1377

          SHA256

          5cb9a052312d060ecbb87bff5e05b076047491e8aa218175f3a4a0a81b5d3c77

          SHA512

          2c25848a4eae2914704bbcdc29efcd9fa8f2503cd522ecdfeaf46c8ee35e817019121082041c4e2fb2ab8c66fa720a25b09c7e621cb3bfbd399a13772919743e