Analysis

  • max time kernel
    137s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2023 07:40

General

  • Target

    f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe

  • Size

    4.0MB

  • MD5

    f0ffdf44a4f3ea16601d0e9227369614

  • SHA1

    8e1c50208af9c594ba6caf4723ab4e1e49faa90f

  • SHA256

    f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7

  • SHA512

    2ca7bb1334538274dacdbde31d06bd4284112efe04439ccf3f2c5d9b4bddadde47c8210e5cbdbc24992c2d28224a874c8b581f1a854d8f6e8534cfe98d655022

  • SSDEEP

    49152:6ub3nCuhEBygPHQK2FWK9w8Y+r5u8QeKxFOJxdb4vZKVx:hb3CuhEcgYK2FhKdzOJDb4v+x

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe
    "C:\Users\Admin\AppData\Local\Temp\f40cbd6f8eaaeb5ebadae555bb3ef93d1bc914084a93df65f921dcd6db80cbe7.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    f83b93ecc62ae40a4e664553ce1d9dc6

    SHA1

    0aa1bca6f316fbc114d445b7a01992936ba9fabc

    SHA256

    c4fa4b940250e404e3ee4a23e2b26450bd27af32aa4206118859b7818564da8d

    SHA512

    dbea184b29faf2dbdf318b0b6fe60f4150783c2f83818ce90d2ead6a4af7ac7adbc766b17e49bf8f225f04be807e56885eb3c6a60aa5276ff47b9c04f20aff83

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    5KB

    MD5

    8061375ab42acf269ac81034c6cded5a

    SHA1

    0483c9d0605c6f8cff0924efeae5b3fbba5cb335

    SHA256

    16fd5d7ed4d511f2c9014e822699d2c1f128c2673edd3dd67a1f99f43de5d3fd

    SHA512

    78539883ae3f5bab3b3c1d09db4a81c12770b752afb5d24366ed5c0a53b12c5a073c6ce8b466484adbda7a29f9dd1e91fa3759fa6361c2ddb60b09550b1ce2fd

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    cb7afa5317d82e4b2516b915b49ba823

    SHA1

    e7e62674ff3bfe9ddb87f7315c64795fa50ccdf2

    SHA256

    2fd6729f7a214deade5a9e30927a81ba1a5ab5867648fb271dbef0821a5e3a64

    SHA512

    3f4f3fb0889aa43bdfb5103e0552ed876cb96faf3ed5e32e04f380054b1fd04ee4c5041115416c6b4d7651150f268351ebe6e207dc20e6c905a33a01c0009782