Resubmissions

07-11-2023 20:46

231107-zklhqsga2y 8

Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2023 20:46

General

  • Target

    841d8db6f5cf53016344670a89b739c767a1006a54fc745c3f2f63d322c62506.exe

  • Size

    4.0MB

  • MD5

    4d6cf5cc71609cb4bac23fcc5df28f43

  • SHA1

    4b73b1baa0a87617d9eee14a925e0c46f9d261c7

  • SHA256

    841d8db6f5cf53016344670a89b739c767a1006a54fc745c3f2f63d322c62506

  • SHA512

    cda76ba45cc50fd68e2e886d9b5014b495bdf4b11b608a4f76c47d8567b4828342b052339905b23a306a4725ff42aa72518efc1b85f48dfc2595da10791f1464

  • SSDEEP

    49152:6ub3nCuhEBygPHQK2FWK9w8Y+r5u8QeKxFOJxdb4vZKVx:hb3CuhEcgYK2FhKdzOJDb4v+x

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\841d8db6f5cf53016344670a89b739c767a1006a54fc745c3f2f63d322c62506.exe
    "C:\Users\Admin\AppData\Local\Temp\841d8db6f5cf53016344670a89b739c767a1006a54fc745c3f2f63d322c62506.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4676

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    5KB

    MD5

    620e4f91a754fbab41288c7ab00bba35

    SHA1

    381038015d4dee27b14a38bb2751881af095767a

    SHA256

    10ab2161ff7115b05f853e3463bb1d3a6d8f62583f9bc86a4750ec5fcf5a205b

    SHA512

    ee4b905a47f24479ba144779e68f5b44335838dddf9bda3423f9233bbfe8a4913e2c29250c262f995ccce1322b9ab431d772e4f83d3a80697b16823b4e5717da

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    5KB

    MD5

    620e4f91a754fbab41288c7ab00bba35

    SHA1

    381038015d4dee27b14a38bb2751881af095767a

    SHA256

    10ab2161ff7115b05f853e3463bb1d3a6d8f62583f9bc86a4750ec5fcf5a205b

    SHA512

    ee4b905a47f24479ba144779e68f5b44335838dddf9bda3423f9233bbfe8a4913e2c29250c262f995ccce1322b9ab431d772e4f83d3a80697b16823b4e5717da

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    9cbd9d8d087263337b6073713ca6bdc9

    SHA1

    ed9f650087546692854542f0cb88959261486b58

    SHA256

    dee471e62145437a79cde90296cd2d8a9032dc83311debaf2a15e52cd6e0095e

    SHA512

    ef8b3c82e5f6b38a8c962a546c180c0cac7d85bb7389a71a1cc29f7969043569cd7320303c5e641e2dc26db96637b1da1d696c127069afe077792e6946df339b