Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2023, 14:45

General

  • Target

    d905c1eb640c4d097719fb5f1dbdfae89ee9478ca870c0f4f32d07c3853c828e.exe

  • Size

    4.0MB

  • MD5

    05dee0988737109c005f5d7e1d253a34

  • SHA1

    de301e53f125a3e5089dacdf1c486476fce96c5d

  • SHA256

    d905c1eb640c4d097719fb5f1dbdfae89ee9478ca870c0f4f32d07c3853c828e

  • SHA512

    5d81bca2a270ca1262be7425ccb992db5b73cd7fab7de5be735169b6abb614ee21664fac7c8c04337175472ae6e74c28d51ea1ba3af5c9ed1ab56124f0383268

  • SSDEEP

    49152:eub3nCuhEBygPHQK2FWu5wQY+r5u8QeKxFOJxdb4vZKVZ:Nb3CuhEcgYK2FHKdzOJDb4v+Z

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d905c1eb640c4d097719fb5f1dbdfae89ee9478ca870c0f4f32d07c3853c828e.exe
    "C:\Users\Admin\AppData\Local\Temp\d905c1eb640c4d097719fb5f1dbdfae89ee9478ca870c0f4f32d07c3853c828e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:5060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    21b45f19efe04185715b918b902180b4

    SHA1

    95934be843e2b3daa8679591d91a9fc58c90cfd1

    SHA256

    d2ef0b707b922d2811f55196b6e3a242bf275b572caaa79bfb1b43223660e31a

    SHA512

    b6c3d3efa3cb33c7727a970b059626ca96562fa3a1151f9c98b676154c4a98f935d664930f8d61292a2b9849e398f71bb19b70b30047f3817810fd1ad99b3f3d

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    1c812f0346e56bfbc7e98463f4c114e6

    SHA1

    94d4088aa0c39b97478982bbd8e90a179fa408db

    SHA256

    ab87fa1a29c828faac428239e317b97d1da77d76a59ab47f7e30a7ec94300fcc

    SHA512

    9cc308af447ff3b527c0502e496619b1f809cf8eaa9bc53a0d8d944a54edf4f7baff521b146b85e8f10c2ca94f751c1424733a71f33c4c3d19981c44550c83d4

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    da46981675454981f7fba4db1309e74e

    SHA1

    b849d1a98be6847c781f06be96f538417f0d1d95

    SHA256

    776218b283d3d9239cae8492c29704a84c7653ca1123d9a78b4da1df702fe29c

    SHA512

    5edf72f2513d60594f3978bec943c43da6266343b605231b72698b94ffa36743b93c3083db5d51209efb872779e8352a94e86f2fa26a6719e39806daafc1abca