Analysis

  • max time kernel
    180s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 12:37

General

  • Target

    e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe

  • Size

    4.1MB

  • MD5

    a2def4df0430b93a2fea58c95339fbf4

  • SHA1

    4d7de9891f75511cd6c136cbe78192e700e75458

  • SHA256

    e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca

  • SHA512

    398772d664b9927c70c80be0448f6a086c1e86bb3207cf9c6f437475ed380cd67e8bce32839df8bab42b39b81746826a6c1f55aacfe56a519bd484d477a6051e

  • SSDEEP

    49152:wDnaVVMzMvkMUzM3n5x9e5fPY+r5u8QeKxFOJxdb4vZKV:QaVizMvkMUg3n5xaKdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe
    "C:\Users\Admin\AppData\Local\Temp\e75085ce444d42f84a65ebcdfbb40cd329124ad68893ba0a301647eec41f56ca.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:5064

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          61d5b300cceb646d53c7d59ba0b0dba1

          SHA1

          8452d28256b6137766c64de1e41f96d766c0e1a4

          SHA256

          7c5705f57b3462b3787026b477797bf2bac86d6680ed3dfb0d97b59ba99adcdd

          SHA512

          f971c72c96626023b0ba8402bace34a6167a628a5aed56c4018caca13efe83728135e6a94dc34e998da7df468a959027f36a1bfb5268c98a91b0e083253b02f7

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          61d5b300cceb646d53c7d59ba0b0dba1

          SHA1

          8452d28256b6137766c64de1e41f96d766c0e1a4

          SHA256

          7c5705f57b3462b3787026b477797bf2bac86d6680ed3dfb0d97b59ba99adcdd

          SHA512

          f971c72c96626023b0ba8402bace34a6167a628a5aed56c4018caca13efe83728135e6a94dc34e998da7df468a959027f36a1bfb5268c98a91b0e083253b02f7

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          93a17590f790dff4e536f3e8a87b4d28

          SHA1

          4ed8a39b1cdbdad4067ef1c6b8d12958df0e2109

          SHA256

          2c50c5d8ab358408772bbc7df057e405aa465ff44882b2c569708adfea6e2f0a

          SHA512

          782a4476297d690b34a3b6021afe12a59c0d8bcfba2c5e14cb431f0ff4dd5a38f151cfc0c4f790f0add600b91cabcf3c35e0bcbcea63e9ceaafd5dbc1d74c5bd