Analysis

  • max time kernel
    145s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2023 22:31

General

  • Target

    da16af4c59e276f16babd03fddcbe97ffe7515e5642a4ea664385828c7c46232.exe

  • Size

    4.0MB

  • MD5

    eeca1dfc46dc469676c2b34facd9ad0b

  • SHA1

    945ff84ab7c99a2b9758c88d5064bb595cc62bd0

  • SHA256

    da16af4c59e276f16babd03fddcbe97ffe7515e5642a4ea664385828c7c46232

  • SHA512

    b0f84deb3b6ae3246c37e3df6eb9aaa63fd75074deb141d4b3d8614119758ca193c191cd115de6897ea57a04e8c0542b2d05165b8bc43d32721d1881277635ee

  • SSDEEP

    49152:lv4THDVBJQWLz53ncPlXO3doY+r5u8QeKxFOJxdb4vZKV:V4TjVBOWLl3ncPS2KdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da16af4c59e276f16babd03fddcbe97ffe7515e5642a4ea664385828c7c46232.exe
    "C:\Users\Admin\AppData\Local\Temp\da16af4c59e276f16babd03fddcbe97ffe7515e5642a4ea664385828c7c46232.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    1efb09d51aaed477704bb7f4a0d2c582

    SHA1

    bb1993df27955e92aa122e30223f087d119c18e8

    SHA256

    dbbd9a60bd8d3da02f8d9303aaf929e27370bcc3e1cbc2bc4dbc93fa2035bc82

    SHA512

    b3c53444dfe6ca7626d46018af3355bc179a1e849a570f2691e9ee55e2ef7a17fe03237f2439e522ef6f875e9776172e119127f690299e0b84438d2a222ea125

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    106e05cef51cc9a88c20f395f1111096

    SHA1

    0a3d676cf848efbe4e3080367fdecd2967aa9a53

    SHA256

    ac166063363c967dba181e86195d2d6c5c0f7fd34e93c26a310c8c6e7d3f1f0d

    SHA512

    dc7b8f9578c5ffa7d4efd9719eccda089b87cd5d75a4fc5e3d9e0bdd454e95e5aa768fde64a31eb876d438cc7c558e658f44b8a9032ca928285e1f1a556fcd3b

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    96e4e6a7fada904461491e853f917468

    SHA1

    2abc4b4a44a8cf4034d3c82aa8150df8fe963f87

    SHA256

    77f9ddce634116a25f559844a15cf7a4193a8cbe348b8ca9a0c085dab67e45bc

    SHA512

    369e762006a9d3912e4781fa9cc8ea10fbebf159239ea479f0811faea5387d3e51286f78bcbe4a4d13b12b1498de2e99403b55e0a6abb2a15f877289b9e3ca61