Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/10/2023, 07:37

General

  • Target

    2d05ee57cc109a54690b83fbd22a635c9dc446d99af36b62744e65c2a28b4f02.exe

  • Size

    4.6MB

  • MD5

    4811b91d161f382809a6737f2c6d7f12

  • SHA1

    476dd81c7b3310bd8534b8f8fbd41c67bfdb7b68

  • SHA256

    2d05ee57cc109a54690b83fbd22a635c9dc446d99af36b62744e65c2a28b4f02

  • SHA512

    2c710a7d5d1501571d0b0cf0a5bb60db20fd1c9739ff2d2cb01a23f26c8db083aa5fdb2fcb5c86c950b01cee1ec94e52028bf4f5c9f863d570ba942534053454

  • SSDEEP

    98304:IG1c5g+Wm3n0tzGoFrnoNspKdzOJDb4v+:UgjGoFrn4wN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d05ee57cc109a54690b83fbd22a635c9dc446d99af36b62744e65c2a28b4f02.exe
    "C:\Users\Admin\AppData\Local\Temp\2d05ee57cc109a54690b83fbd22a635c9dc446d99af36b62744e65c2a28b4f02.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3420

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          7KB

          MD5

          8da62b8f863cb6a1dfe85d012975d503

          SHA1

          0cc554284371e6961aa0af27ed1b83052b34ee20

          SHA256

          cf27d0c7a7da8640aac0579243e4fb57c5247e62e615150c8e3d028a6e0022a8

          SHA512

          aa984b809392a33d115e158472ede276e90f38a3fef23b3fa46258932e0021ed79967649eb9aa6509ce4be0e422c3d1fc9b56fb7b6d59665776ff6eec33616ee

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          5KB

          MD5

          48b4ab740ca656bd8342a37192f9adf3

          SHA1

          db4606ad51173f4aff8f372368d7df122c5399d0

          SHA256

          c0eb9983350384c69e1ede79bb50616084d0355ee61121ed6d3709dda883f606

          SHA512

          a9b23501bdccd27599139c4d1a3fd25a58aa4c8b5cdbde3c776d548fd89b8f6d59e54d9ddff3d3cababda78ccfdca7d20c2608cd82bbd741cf8ce89e6fba1b35

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          51a9f8842a8977475aea7c4cd6cb58de

          SHA1

          e5d0eeef173dcfe371ecd72d75aba5c3d1185d92

          SHA256

          9f56e6c1ad051c8cb80a18b0935f8896da710c7dbdeabfb19e1258c8736a95d0

          SHA512

          48b82e9eec12a9ee19a2ff8782583f4dcbd6433b98d27de29a7b4a61410136d10308b3513ab4f22c79a68fde5d261ea279d31507166d4a08c24e22b6f332aa4f