Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2023, 17:56

General

  • Target

    4379af351e5d1891c7aa7941872febfc9898c1a36040851d0ef2cef6bc8434cd.exe

  • Size

    4.6MB

  • MD5

    ee09d0e7f358b514a5e56580a1b4caf8

  • SHA1

    131d7bda04e5eb770cc2c16e877e84e627fc32c9

  • SHA256

    4379af351e5d1891c7aa7941872febfc9898c1a36040851d0ef2cef6bc8434cd

  • SHA512

    2466f514d2784950a8df0cc69d39c545cde47b0bd43a4ebca063fe99576db59bdce0ad78de980367786ab38786b60c749457d4a46d5d35db8ab2185c3e0aa775

  • SSDEEP

    98304:WG1c5g+Wm3n0tQLCcvITqy9KdzOJDb4v+:KgALCoITqzwN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4379af351e5d1891c7aa7941872febfc9898c1a36040851d0ef2cef6bc8434cd.exe
    "C:\Users\Admin\AppData\Local\Temp\4379af351e5d1891c7aa7941872febfc9898c1a36040851d0ef2cef6bc8434cd.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2492

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          1KB

          MD5

          6873636076f72735769c86636687c0cb

          SHA1

          46827b4ce6e22cc7f45164ffd96da22fb602d273

          SHA256

          075bb0fcd6d4db7b34fa34e075b0b59a6608d04103b9b7c540c06de746e58319

          SHA512

          3a8926bb4476d6e222d752e2064f909d8949eb808910eb3c76940e95e9367b5e0cb9cab9de195edfb6d7905f724739cae2f9fb7b3ebd6ce8ee740760543cd2d9

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          6KB

          MD5

          9c28044db795d21c67e70ea092f09593

          SHA1

          c66d86b5db07d0b3e6a7e43a44158ebc664727dc

          SHA256

          d77cab8e68279aa79c5aaafdcc48b77ebf73b2cb661c3a1ea8a46f6cbd0e099a

          SHA512

          05c81533acdd2638c91a3d15e962a24a1adbeda6c64a1e3c69e1fb712703fca3fe36b320d61d67bf2fcf48cab42998c8dd69152d4a6fb7ec60f0e199d974187c

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          2b144ebe4fab8117ec157423237ca6e2

          SHA1

          0a88f81fcf3a1639d946beb56f6845cdff677f69

          SHA256

          270cc0e1240e4f88f32b987688aca0bf8409c827938f781d86648442dbc3ea3a

          SHA512

          656b6ba58bec09d125e7cb36bbaa8307f7f6146dcf8c5914053e417f36f98ad731145ea40f55b050aec802d590af77d8199244947fc26b120175aaa020b2564e