Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2023 20:40

General

  • Target

    ed54265de49201c5e88eb95a17470cc6660dbf01bac3b21b8ce98ad82e25ce07.exe

  • Size

    4.0MB

  • MD5

    7337a2ea295fb220ff233734af3c8c25

  • SHA1

    caac6ea7e70cd04a1858e7a7c090bbc333dd28a0

  • SHA256

    ed54265de49201c5e88eb95a17470cc6660dbf01bac3b21b8ce98ad82e25ce07

  • SHA512

    11b8b9432b84c81a28307320de674c291ef00f96cba78a3a4983df37712e3d7e69d34d05fc8173167433270fc317bd7825599898f5ff04b0af76f7d16ee05f91

  • SSDEEP

    49152:eub3nCuhEBygPHQK2FWu5wQY+r5u8QeKxFOJxdb4vZKVZ:Nb3CuhEcgYK2FHKdzOJDb4v+Z

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed54265de49201c5e88eb95a17470cc6660dbf01bac3b21b8ce98ad82e25ce07.exe
    "C:\Users\Admin\AppData\Local\Temp\ed54265de49201c5e88eb95a17470cc6660dbf01bac3b21b8ce98ad82e25ce07.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1340

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    7137ba5ed58a02ab410c2753030db271

    SHA1

    193ceddc9737d096a82838f5a00ca29dab85f687

    SHA256

    3e2499d8d0375269beb1c4d28c16fffaae80ad60423e01c2d50a90d63dd0f5d4

    SHA512

    b8c924a1e47c784de2fe9f912a7ffd5e404746ead3b5449962258e07055317256975aa19e733153816713f9f9e4cc95b375960e27e74d168535f58b3eaeaaa74

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    5KB

    MD5

    84805cf3bef4fe14fb6466657d9cc494

    SHA1

    71ceeaae9dd82117b6f5c542677d666a114acf47

    SHA256

    aa3267c0a69fc91f6074411fc82aa2a56af8b56af81161984b7b3a15180f27bf

    SHA512

    5876a3774fe2c2f5ce0a06c6dfc3ecf9e13c804783d9659ebc3ffea72d85c995c344afc8c14d477490b0df326269ad912caea31e2fe5f506be5ad6c1020e1caf

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    23b82561f8c44daef4b6675431ac8580

    SHA1

    23bb40227a3438a6b0f5acb15c4de61f078a6d66

    SHA256

    7bd4f476bfa9cc340b9f4279ec17739a94d905c55d4a43b616d131454dc7a251

    SHA512

    77dbedc9d3fbc7bd8b025bafd4735b3445e999f768d40e922d64d63c5430a3854eec8f114dde5a6da52162a53ac092548a841bb00d6ce3c4d1276c66637cf466