Analysis

  • max time kernel
    167s
  • max time network
    253s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 12:02

General

  • Target

    d307f9f341913d3dcd93f7140a209155e77eca1d9479265a8e1fa616cd0c08e9.exe

  • Size

    4.6MB

  • MD5

    4d08e51e39c96e9cd9d6735b8ed56b8b

  • SHA1

    6e840fc7d7ec4d226c342d021133e913bb64ce18

  • SHA256

    d307f9f341913d3dcd93f7140a209155e77eca1d9479265a8e1fa616cd0c08e9

  • SHA512

    98963d6c2d6c9e7811dbf264605232bd076c27fa6e1f20dc6b1cd797b6affcd7c8c804984e4241be891bd405d5769afce05f218f747b46e472f758835c57b2f4

  • SSDEEP

    98304:fcOxoa2orK2t+Gwo2xaWJWRzSKdzOJDb4v+:Tos2oWJWRzxwN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d307f9f341913d3dcd93f7140a209155e77eca1d9479265a8e1fa616cd0c08e9.exe
    "C:\Users\Admin\AppData\Local\Temp\d307f9f341913d3dcd93f7140a209155e77eca1d9479265a8e1fa616cd0c08e9.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2772

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          1KB

          MD5

          eb0dc0a577d1f17e23da74081f871ced

          SHA1

          a62614bf78566d4dcd602fd510afa9ef3e7350cc

          SHA256

          0657f9a506d1249f6dcf53ca48fdcbb5b20413791a0d16bcc30742d4f8e6af79

          SHA512

          33a19d7bbae4d9b5bcba070fd4b9c7b10ec8b57ea9b31d77f9a372a2fc5af325d776490ebda7ca536936d92235b26f43c67d5e0922e45340a2a5b24e034f020d

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          08cc0ca78d770aa6ea0e5a4a22afae24

          SHA1

          f45873a7fbb9ea9e43fedb1c7a0bfe19561bca9e

          SHA256

          4ac1b28f618006b0642e2c66afc902fbbafbafab5627d6a858d3d9aac57143a0

          SHA512

          b6fc9cf50742771b3a6f9e39b863548a302dc747bc2a2b98c54628521fde409847858c5c6208188857b82948988223e52ea426a3c503b3962d245c7b05db5517

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          86464530ea7fd8aa3715b1ac0c3d8035

          SHA1

          4e1bd04c8b08b55d4bcf7fe3cc295730419781b8

          SHA256

          13c04e281e6438ddeb12a1eb85f964702db8449a3e5da29aa7fd9ec54e7f8fa9

          SHA512

          aad4b3f0e8e039423a4c3b6eb31153d50f1bdfb43748a013513a86caf26c9230de901ff2aa12fc20b947ad0252ed55028c6b4c105976ec0d78892f8fd8f79c2e