Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2023, 08:01

General

  • Target

    70b1fc062adf52e690131c552269033dd5b12ef5a4b80232e85b0b033b096b83.exe

  • Size

    4.7MB

  • MD5

    a1eea7cba38307ef1e7a49ae9637849f

  • SHA1

    ae5e5524df1b11960ec7899774f1a8fa8b6633e1

  • SHA256

    70b1fc062adf52e690131c552269033dd5b12ef5a4b80232e85b0b033b096b83

  • SHA512

    d44bd5cef4066a04275cf5b1264581b362fa73311fdd2e68645d91c06764fd2f2c274c3df87ab01cfa23e60f19c74948c0766f357b06dec4ffa6d240192d6c91

  • SSDEEP

    98304:Q2XeHdZChmK2dCzyicP21FqKdzOJDb4v+A:EdZ0+ilpwN0v+A

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70b1fc062adf52e690131c552269033dd5b12ef5a4b80232e85b0b033b096b83.exe
    "C:\Users\Admin\AppData\Local\Temp\70b1fc062adf52e690131c552269033dd5b12ef5a4b80232e85b0b033b096b83.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4684

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          1KB

          MD5

          681301f0e508e9e101c188aba0c79519

          SHA1

          553c17eb39565f648a7daedace8908a2a69390db

          SHA256

          1ab995f0a9ad7698196c2a7ce7b3a0264b96acdb523b2bdc6ec0a495e2d45ad2

          SHA512

          44358a1af2f13808b0aac48101cffa9797686457e6c7bb14f76d464b2c9dd0957a3ee2d7c55413d1bdb9d6b911282d45944929e783c983be13eb5b03a2982f0a

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          7KB

          MD5

          a15010eb8e7a966588a00cfd1b14ab84

          SHA1

          c9e46744219fceb12b0c35cee4d29ef8dfa86844

          SHA256

          6e204855202a02cb706964a189fcb687dafa8e878cdf9a1bbf7d7895c4272f9f

          SHA512

          5d6db3296f1ec8567a2dfcff5f3b5aaba0eeebbe7742427702c15740faf528eebc76ce302a03968dcb2e99efcb0e4394769139577f6b2b885bea0aea3ef77e6d

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          17d1b637623fe99e102f028653e9f359

          SHA1

          63d84c1e56f849cffa76a8e13fd1fdb6e03fea2c

          SHA256

          0b4a42aa5beff65fa10f3f0030fbf8da8ff76339a45a98929861f641233d6dee

          SHA512

          fd2724ef58d37f28aed6a464d5540f412fb569dd23bf0238eaa57e81d8a03c6132955eb66205d8c7643d88395ef48bf1c63ebe5026cac1720bef0068bea648d4