Analysis

  • max time kernel
    138s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2023 20:45

General

  • Target

    1780525d82831fc63e43ec9e111a38dbb0ba02788012afef0e56c01a3b37845e.exe

  • Size

    4.9MB

  • MD5

    88f18fa8dd520a677946bb53fc5ab472

  • SHA1

    d56ab38c4d4629ac0646a4675363a96c52c4c114

  • SHA256

    1780525d82831fc63e43ec9e111a38dbb0ba02788012afef0e56c01a3b37845e

  • SHA512

    e6fd7d532365fb57f86c580c2aaefbd0512dd627c0bb56fe1cab4797e767de041fcbfcc4e7a72f5b1acbd747e66d6cbd89987d3a22f76e7a9e7a7af3fd8efac4

  • SSDEEP

    49152:tHhWJb8R2TOaCZgdVDgCes3jII0Ee9Uc1c70oPBkgoY+r5u8QeKxFOJxdb4vZKV:RhQI4CudV8s3MKI2tkVKdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1780525d82831fc63e43ec9e111a38dbb0ba02788012afef0e56c01a3b37845e.exe
    "C:\Users\Admin\AppData\Local\Temp\1780525d82831fc63e43ec9e111a38dbb0ba02788012afef0e56c01a3b37845e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2200

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    2558cf2aecf953da1a6cd06dd99aefd6

    SHA1

    edc3504d06a8400ca08eeaa9e666403c98d02e66

    SHA256

    6352fbdb24b67d0af4c7854449090cccc3ebcf26616d4938bc1795c2c78149c8

    SHA512

    94fdf0e27fa0d587e4f144de7e8095297f6c15cbb9dcaf282fdc8540577e479ffaee4a34c8e23ea104ab7d825c644d514963d1a0df77097b0ec20b3edd8ee9af

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    3KB

    MD5

    f300ec4a94b1f28a2f24816464d41545

    SHA1

    7ef3a0c0c3a78e93d78bb0f3329f04e1be7cc0a4

    SHA256

    4accd4fe97a774ca516acceecb3088eec0f967f1361863445e579076b9be52e6

    SHA512

    aa8cadeacb8a437c2fb195dbfd495bdb21e9b940a6012382bab8c3c7f8152bd211f633164407eee04ea77a57c290336a88078834bf22b7298e32f159dd8fd70e

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    9629cd1c52662295ab76a3b6475ae050

    SHA1

    c2aa84d28b56ab62d42f47454f48d1abd4fe0de9

    SHA256

    18f71efe13c11edb38c75832da7b11339d9c7c17be69a5683356c058d840169d

    SHA512

    7ad0812f248dc942265bf61be6b21554a2bde926feba5b5dbd2252c147197d1fe1bdd7d6039aca1c05679d4ed1097d3269a75977246d426d0719cc039ecc26f1

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    234a7e5e1dc4e9365cc3b74abd7ceaf3

    SHA1

    f3e1ed894b2d067fef4ccfe69893f1b9047ff1c5

    SHA256

    431b292b67ea5e882615a608d1f02dacd3c4faaafbbc070b6ea1e2a5529c44de

    SHA512

    a4b7b3ee798aca759664f078c8b0327efc7e2830ef53a8d8e46dcbcb995ec554d1ae21a2b72d66844f60fd7db7010b8a91f9bedaf60a65e73c6ffdfb938660c7