Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2023 12:37

General

  • Target

    a4161227a8b4345a30e4e4cfa78c536d775a5f7d0cb49df97aad759cc40536ff.exe

  • Size

    4.0MB

  • MD5

    de621a353094b438ee0abe1c1f1f69ee

  • SHA1

    053e855fa5c262a7e3167eaece8080884d988066

  • SHA256

    a4161227a8b4345a30e4e4cfa78c536d775a5f7d0cb49df97aad759cc40536ff

  • SHA512

    01f5b35c844dfee267adbc3b036e3f0f995539199b6ad42f1b2d61dae5d8540b12d8debfbffc0e620221179f425176d10d727b774802d2c415b634dcd1657b2b

  • SSDEEP

    49152:lv4THDVBJQWLz53ncPlXO3doY+r5u8QeKxFOJxdb4vZKV:V4TjVBOWLl3ncPS2KdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4161227a8b4345a30e4e4cfa78c536d775a5f7d0cb49df97aad759cc40536ff.exe
    "C:\Users\Admin\AppData\Local\Temp\a4161227a8b4345a30e4e4cfa78c536d775a5f7d0cb49df97aad759cc40536ff.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4496

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    2KB

    MD5

    cf6bb8eeac669475a118389529123b29

    SHA1

    e0b9b266b8b8ba996cd596e5f7e18b7cd234ef4f

    SHA256

    76ecf37c62e64261f107ae780e774106312dad0b7c56d08fde4c296eb95a7cba

    SHA512

    5957ebb85152adb50b7be2afdf194f3594a7147b55920d36ef558be056ce3f6e5e9b0df255e5d111bcacff495d76510b9b2290eb7fe68658bba45a65e6a39172

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    49896e749b26dcf20e535af4d6386d43

    SHA1

    bff62d558f5eb3bb83e86efeef8c0ef443cde575

    SHA256

    5c5e20a726370d982f5a7ca4faee9c78dfd53ef425a819288a060454b7ecf502

    SHA512

    9b04521bcab9ef187848f4ec2ed9f75fc2689b7a762ab02a983a2a39f93081f49f596238644b0dd51336cdb6d4111589ad1262d8fed1a7cc98763c7d0c1f3b9b

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    f3fe90715f6e7f223aac0807b0c9e235

    SHA1

    777122a0bb0714954eef1a8726f1e3f1aa3b49fd

    SHA256

    52d61fdea8e823483197f2952b27665ae609372bd52dd99791cec3b1abfb444d

    SHA512

    7f77f57fec694182bc78d9c3b84accf3e0135e16652e7bbae794ebb814c2b6900f757248c6e1a0a21bb2947dba702cd296a699d457b7cc6bd3c43e69dca57cd4