Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2023, 06:29

General

  • Target

    eeff2cc1b0601b504b0edc003c6bf5b541e6ee1129e0008710ecf14a5e23ca1f.exe

  • Size

    3.7MB

  • MD5

    84b6f0407d779ad2bc76bdd9620f206a

  • SHA1

    1a5b561f2b35f73983e487c06bc5d564a6d522db

  • SHA256

    eeff2cc1b0601b504b0edc003c6bf5b541e6ee1129e0008710ecf14a5e23ca1f

  • SHA512

    ea252bf11bfdfdc9bf43c4588df1d5f2d99bf6b70e21d1a4af77f4ed2f292b8344fab78221e967cf2f4061893801e7a1c3eef3c448edc4259102666563368f36

  • SSDEEP

    49152:iDCLomiK+15C6mBPtS3FpAB+r5u8QeKxFOJxdb4vZKVx6:cootK+1k6mLYKdzOJDb4v+x

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eeff2cc1b0601b504b0edc003c6bf5b541e6ee1129e0008710ecf14a5e23ca1f.exe
    "C:\Users\Admin\AppData\Local\Temp\eeff2cc1b0601b504b0edc003c6bf5b541e6ee1129e0008710ecf14a5e23ca1f.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4960

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

          Filesize

          342B

          MD5

          59e1cffbbacfa447e196843cc108a79e

          SHA1

          9da6fd5f0bb0f272d91eef787dc33a6aea025319

          SHA256

          5bf6e0d911d719ed2e8bf392d94507a5d1ebcadb418e021a5bb79e9bc117327c

          SHA512

          610d4ea99dc51896bf4e78777849467dfeb42b34cda633d51a465ce9dd321384b2fc60e60807ef5127d15abd11c375f736cbd6fa2e88586eef3d17829f5d9be2

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          5KB

          MD5

          efab911d3e87a9d6b60b81c3bfbab8cc

          SHA1

          3cb3c128d1dffeeed1b2a0a23dc8ea69670bc10d

          SHA256

          b3e7fa934e59c500fe590b7d7223a488b5a16a0f8db6b60d12d2f0bffb2e6e91

          SHA512

          e2b3104c3fbcdc20371a48ef29332903fab7f53fb92f9c3c797a0b8c01eeed7be860c370a84792f75d7c8fd7a857a6bb088e7eb88c8f44bf7145620e7894a771

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          c7d10c893b68b54093b3a27084ecf901

          SHA1

          9dcbf481becb7378778a66be57a94e8a9e1144f8

          SHA256

          ec5bddb24a1d75e83870b6d6aadda03bb880449fe6ca27e3c337e8095695234a

          SHA512

          a8e86b3b62c3f2486ded7b8c7250f259e6ecacf2e07cc90d51ea48ae6cacc1d20462b54caf612636811a10dd4375dde7910ff276421670600512ad54197b2524