Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/09/2023, 10:54

General

  • Target

    f5a522759725a6452b918176b163f9610eaed2e981f3eaecc06684ce27011ec0.exe

  • Size

    4.0MB

  • MD5

    dd3d79e8421eaeee52586f317355a7d4

  • SHA1

    81a778b21f8760c34b0b45bee755091434d06e4f

  • SHA256

    f5a522759725a6452b918176b163f9610eaed2e981f3eaecc06684ce27011ec0

  • SHA512

    3a84501f3363b8b50d340bc32c5f4c09befd0737ccf340a56fe1a7e30c4583928f88c7ac3371999f812e690dea06e85b5b4ed8160381898794d5c9a8ec45fe1e

  • SSDEEP

    49152:Q0N3IpkodZfdlTXKnB3nZduwP4oY+r5u8QeKxFOJxdb4vZKV:B3IfZfdJXKB3nZdhKdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5a522759725a6452b918176b163f9610eaed2e981f3eaecc06684ce27011ec0.exe
    "C:\Users\Admin\AppData\Local\Temp\f5a522759725a6452b918176b163f9610eaed2e981f3eaecc06684ce27011ec0.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3312

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          6KB

          MD5

          9a92136a2ff45c2c40df42046bbdb793

          SHA1

          509149918d783cd83c6e5a9c55fc8017bc4081d9

          SHA256

          346a4fc7bc020a913c3cbc28af525598563e7e74e4ccc244e9302d15fe95ea7b

          SHA512

          4d315569cd055d70f63e16e449bea9529e7898e682368c6e860f661772fd55c20c863165fa82e2d905e130ef3f48ccadf24f658e919f279847a1f4c95df23b86

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          d1660bafa171e5be72dc27e5f86f2b15

          SHA1

          602990c06b7c4ffa18fdb3b2cfe56fffc9863b52

          SHA256

          cd388c402f575d7833a5acd399929a0ae250409da043610d546ad3899091156e

          SHA512

          37d3ad75328ae7517e22aceff78d0de60c24b790006c261d32f6634bdb163012c7fd7c03f99bcd0c68b37f4f8ab84e79cb5ec5f147233759132a0738f66ffcfa

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          a980d54bdfbb3d72a3c3be7dc9e81fc7

          SHA1

          3a5bae3296fcf4b2f566a58010fd649c0e31192e

          SHA256

          1820141faed00f98d4b3a1b73ed0cc5fb6ee620218fd0a6d0eaecedd2d3f667f

          SHA512

          4c979bf6f476c46aafe608e4f6af47877ec978487b67074a9402924ac414fe7abbcd222e83b400464c57ac76314928b9192b1b2a1def43de4d0272189d43e935