Analysis

  • max time kernel
    3s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    12/11/2023, 09:48

General

  • Target

    c6ca9d08ea7f8dc6b9777c9130673cc4654698ade58fe862b4997e8446d1c177.exe

  • Size

    4.0MB

  • MD5

    d2c0e0287d0d94aad4f976767555a145

  • SHA1

    2e01782706dbe4154404eb96a2d272ead5cc4896

  • SHA256

    c6ca9d08ea7f8dc6b9777c9130673cc4654698ade58fe862b4997e8446d1c177

  • SHA512

    9124b3f53477bc50fc6657860f4cf58702104bfd631f20c05c3a3054bd3774286f9bf4db738661acb17aca50847b43a5b75dc81313ff72068f1ea8ce6b8a6c35

  • SSDEEP

    49152:6ub3nCuhEBygPHQK2FWK9w8Y+r5u8QeKxFOJxdb4vZKVx:hb3CuhEcgYK2FhKdzOJDb4v+x

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6ca9d08ea7f8dc6b9777c9130673cc4654698ade58fe862b4997e8446d1c177.exe
    "C:\Users\Admin\AppData\Local\Temp\c6ca9d08ea7f8dc6b9777c9130673cc4654698ade58fe862b4997e8446d1c177.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2944

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    b95494f87b2aa5c38795a705995407f1

    SHA1

    af83c6b90dba3f288a3c6394dede563f9d61c2e0

    SHA256

    d21758c93b075912158dd2f885298b19e03d4453addcfc2e86c284fdc2379595

    SHA512

    7e6edfb2fb4431a085ec302a7dc2aaa9106048dbf87b105f5380fdaebd75673349767d5a170175c01caed035ee1f5ea3c77e289c0b98845d42e93a9239026705

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    458f765d5164e9f92bbf0999cff9dcea

    SHA1

    47e5886f0e3075173abbf5376b44195b930486a7

    SHA256

    937f2811ca0c2d2b4e679e1fe85bb9a9244e91bc076244614deaa3c0af22b50a

    SHA512

    0ee00c3522f56544476065c7878753f40bda106c8b9a7a6c9e1665561ec961fb51607545a9d5d4188a29c5f338d38fdab939fbc5c3fdbb5635742478021a949d

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    9f8bb71f74943973702113561bf2d73f

    SHA1

    677b38f0ce0d5afe06c02b16aec91939d5cc9140

    SHA256

    401a05a2d713bcd752451f795fb2422000d5561688b4dadef95583c7b1c77917

    SHA512

    19e8101ad379746d47ecadf5d7113aafd8ce0915fb5682fe8b75abb3372b1b93a2c79077f65d1b18cd31060c8cd4cc85b45f3e62ed6fce8fe83ff1cca995868d

  • \Users\Admin\AppData\Local\Temp\yb6835.tmp

    Filesize

    20.8MB

    MD5

    a98cecb1b6e5cd2f06880cf006a954b6

    SHA1

    c53fad4bd363bc59833e4dac8ea44f2a3ea81869

    SHA256

    b270879028bed04d4f6ebbb35235f3f5eb4944300fcfe94c393610d15dc59626

    SHA512

    2293b32c761428c8a5013215b41bb4190a2bf415eec10a8e54f5e5cfd65f2f6a347d01fe0d54cb6e55b57be5ce0ca8344cc8e15cf6813b750c06216692385a9a

  • \Users\Admin\AppData\Local\Temp\yb6835.tmp

    Filesize

    20.8MB

    MD5

    a98cecb1b6e5cd2f06880cf006a954b6

    SHA1

    c53fad4bd363bc59833e4dac8ea44f2a3ea81869

    SHA256

    b270879028bed04d4f6ebbb35235f3f5eb4944300fcfe94c393610d15dc59626

    SHA512

    2293b32c761428c8a5013215b41bb4190a2bf415eec10a8e54f5e5cfd65f2f6a347d01fe0d54cb6e55b57be5ce0ca8344cc8e15cf6813b750c06216692385a9a