Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2023, 08:48

General

  • Target

    5f3bb8c19f5730c0947035cdd486a9b4c3f516e48c84b05b0c713d3e726ea2d0.exe

  • Size

    4.1MB

  • MD5

    05cbf2864c3e8636272281a614048397

  • SHA1

    1ba7e93b321444d6ca4da569dc09622a820bd7d2

  • SHA256

    5f3bb8c19f5730c0947035cdd486a9b4c3f516e48c84b05b0c713d3e726ea2d0

  • SHA512

    202a945d776ca97ce4628d9de456758d1a1484e1cfa7e5d4d77576005233308bb291d321922bbc2619c8d131181f79059c89d5e9287cf59096ebc90cd61869ad

  • SSDEEP

    49152:uJG1P05g+Wzi3n0txevRVyY+r5u8QeKxFOJxdb4vZKV:2G1c5g+Wm3n0tfKdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f3bb8c19f5730c0947035cdd486a9b4c3f516e48c84b05b0c713d3e726ea2d0.exe
    "C:\Users\Admin\AppData\Local\Temp\5f3bb8c19f5730c0947035cdd486a9b4c3f516e48c84b05b0c713d3e726ea2d0.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4764

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          5KB

          MD5

          8defa41cd7924e01e12f10dbb023df8e

          SHA1

          eba4e00cffc2649d8be0484a3f321b2c397620e1

          SHA256

          0a9cf2114d38f645291e2c46a97a7c186d401feb303fd379da5da8025ce3f0ac

          SHA512

          b4ff06740ef418cdbe50fbae89af4bd1584e82990068767e51af6bd2893eb02ffaf0bb7e3b73266e36ea20e416e2f0f2912436591b0cc8afe66c10289f5fe8ee

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          5KB

          MD5

          8defa41cd7924e01e12f10dbb023df8e

          SHA1

          eba4e00cffc2649d8be0484a3f321b2c397620e1

          SHA256

          0a9cf2114d38f645291e2c46a97a7c186d401feb303fd379da5da8025ce3f0ac

          SHA512

          b4ff06740ef418cdbe50fbae89af4bd1584e82990068767e51af6bd2893eb02ffaf0bb7e3b73266e36ea20e416e2f0f2912436591b0cc8afe66c10289f5fe8ee

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          a647f1c0d81c53eecbd6cf34d7ce3d6a

          SHA1

          f5e46486d1dd44633925f859d493ea1c0171d5f6

          SHA256

          ec5fec38fcd4688e231955cf82c55db4f4a926f7c6c2a1793e5067ce32a7e10f

          SHA512

          5cdd1460592e0c7896726662a69ae4d74cb075680bb557b87dbc9f53ae9c5960865ea2d6a1d2a3294470892133f14c1e03f2fee0bb4c6f7d4be241961fb4607f