Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2023, 15:30

General

  • Target

    6087c1e3b0891b081ac7b7a9eb50a54309539b194c8040a767f57cf5872a8c8a.exe

  • Size

    4.6MB

  • MD5

    87d764d9c7de798c6ffa20b92583ab28

  • SHA1

    1dac46a603381e68cf4e24e4263955660f91acf3

  • SHA256

    6087c1e3b0891b081ac7b7a9eb50a54309539b194c8040a767f57cf5872a8c8a

  • SHA512

    b0f075561fbe142fa69b2a1b7016be09dce466c30a56b992f7c25da04d9f1405b6e2a7c0b5561f5932117dfa011d0569a3f4da463b0742d97cab12469e13202e

  • SSDEEP

    98304:p4TjVBOWLl3ncPQEF4vClRJKdzOJDb4v+:cBOwEF4vBwN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6087c1e3b0891b081ac7b7a9eb50a54309539b194c8040a767f57cf5872a8c8a.exe
    "C:\Users\Admin\AppData\Local\Temp\6087c1e3b0891b081ac7b7a9eb50a54309539b194c8040a767f57cf5872a8c8a.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3208

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          6KB

          MD5

          ea74b0c0f2a514dfa3e5848019522089

          SHA1

          e80cce5a2ba601c8ad0537a53b10286f579256f3

          SHA256

          d59f7104788fcff982ec4e3f34d4d52d304c574954cc4030b6c2931c4a8aab4c

          SHA512

          25e22a8e7904b813bccf84e9a4ab5cc7d935f7fe02c2cc417ccecd02594ae99750c315d921b941d95a3d4a6e4aa694b2a7ce4cc8cf57dd873adf3e4633796711

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          7KB

          MD5

          97db126936240c9b0678680750d47d37

          SHA1

          13a88543c500a661e9187c582985805e58af96f4

          SHA256

          4a4c16efd92858636afc3f3f9ed662909658ba262fae35f03e2bfbebb540eceb

          SHA512

          d7339bebcc5dcabaa38c8170a1556c9ddd9e037fd3c023b61914ed2b9bc62ad1568c584ce08042ce211b269fe93d56f2adfe97f4dd042756ce8bdd9f437dabe7

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          4eba86414ae972008ed56680f1e9e536

          SHA1

          6307a57a1bf02d62a4479a79ac6d6d459886edd8

          SHA256

          83cca85d8433ed973684f13fabf6894e72a5d882be78e93f8e6d9bb4de8bad66

          SHA512

          298dcb513c253743abdd5d6b8492dfffc5e76a41c1ed2a7f6cd7da245d7705dc953d00a08c48f29208c5bd44287617e8e16cf2d047f9b686a350300adfa5ba34