Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2023, 09:02

General

  • Target

    4ccc94762a9735144474699b1ba0888c4b5ff67effd1fe944792e53365484807.exe

  • Size

    4.6MB

  • MD5

    f2de2a300498a0469dce974341e8876e

  • SHA1

    a960239433161a8309711e680f529ca146c5f7f3

  • SHA256

    4ccc94762a9735144474699b1ba0888c4b5ff67effd1fe944792e53365484807

  • SHA512

    6a3f0d1f93c62afcd1d375e7d54bc398c23ada4036d5cfe4fa4445463da7b13bd68c625299cd1dcfaa69e98f3183c1fb5d5f6334d479b9aa9fa22765465f5ac9

  • SSDEEP

    98304:6aVizMvkMUg3n5xmtDasmlKdzOJDb4v+:+MsR39wN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ccc94762a9735144474699b1ba0888c4b5ff67effd1fe944792e53365484807.exe
    "C:\Users\Admin\AppData\Local\Temp\4ccc94762a9735144474699b1ba0888c4b5ff67effd1fe944792e53365484807.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4776

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          1KB

          MD5

          7ba1667a112259c0f0f1f75ab25c7e81

          SHA1

          ea5ccb9d71a31b27f60648fa503aa204702405ae

          SHA256

          016e4db5d242c14677a5c680496016cb97e3e0115134e0fef488d3bf43a63f14

          SHA512

          c5869dde01ad8b41c686e89d9f7f5e92944151bc19ed8e437bdddcd25eedb3a328211135341a36add15f69bc04ff82fd33a8c8953eea86cda1ecf789d5212688

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          5KB

          MD5

          88ce5d9ab07521da487ede20f43b8ab4

          SHA1

          6d405a8992d28d5317af3d87b28a1571fafb63ef

          SHA256

          3376bacf34a1a97a6abadcf3ca5e85bcbafc81f5a2bddfb559400db911db1f55

          SHA512

          4d40798f818646a4f784095684f5af481464c4980fd0a27aa9f67cb586831461dd098d9222264a4cd92461a96488e63aa6e11781d069d2f069564e2ceaec6cc7

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          c7bc7c80bb99cb26049e5a36310198ea

          SHA1

          0db5c9dbe113083813d5df318ac18d3e6b599641

          SHA256

          0dd86201c828cf13039f52074428f5274409ed12b477d1bb08efdd40977b4fbf

          SHA512

          52bdfc5f5db527489194a9c6c3d0d25f163528b7abc4d635fb056f71cc8fb952106e73ea21e9fbab025949fe7b4bc3dd1692092fcc8c06aec60fb4b8f82d3219