Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2023, 12:06

General

  • Target

    9b9da8ee43b6b164866270c850f18afc5cfa088357bcf502a8809714c5b48de9.exe

  • Size

    4.9MB

  • MD5

    befcff42768f2f31416bb0854ff043a7

  • SHA1

    18b42d5c3349064e8bb265aad8e6e85c204b9700

  • SHA256

    9b9da8ee43b6b164866270c850f18afc5cfa088357bcf502a8809714c5b48de9

  • SHA512

    e7e88ba48edf59ac51fd7138cbd6c33c964760873de83d011537883746a231e4075b99ea47a2803a1dba9653241d70e0f8793c7612e392b4868356ae71f2db36

  • SSDEEP

    49152:tHhWJb8R2TOaCZgdVDgCes3jII0Ee9Uc1c70oPBkgoY+r5u8QeKxFOJxdb4vZKV:RhQI4CudV8s3MKI2tkVKdzOJDb4v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b9da8ee43b6b164866270c850f18afc5cfa088357bcf502a8809714c5b48de9.exe
    "C:\Users\Admin\AppData\Local\Temp\9b9da8ee43b6b164866270c850f18afc5cfa088357bcf502a8809714c5b48de9.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3464

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          6KB

          MD5

          99f3b1f6df3b609ec6b21b97ce8537d6

          SHA1

          ee11ad21970a7e14af516b7bb375798fae0a7b1b

          SHA256

          11f2764871a5f3c165d60afc50a1d6709df6db6a474f0bb15d6813523db16220

          SHA512

          cd345d20c5b58b4cea1c4c304dfabdb8969c896e50746a5b4db30c8ca514b02d0dab9c556664153dacabb1f0b5fc1a2f493f0427223c9db768e10c8230927c79

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          7KB

          MD5

          5f6a05889a4428304b93f56099ac516f

          SHA1

          20e486091a913eecb83acced6ddf9ad9db421914

          SHA256

          4fb72f27063f43ea1663498a48ff894b0f24101a08c3a5fbdf4d20cb1f0d4e5c

          SHA512

          e41b652045ccc8e1170503bd6c852e0a4740dc654bdac1728a4c5bfcbb9510735fd42fa236fa98f3958b6a0bdfbb6caf1a16c2c5e4d7faf1684f363944a4ebb2

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          b6ca6be4d7785181b8689e9963a869e8

          SHA1

          712e87f3b55c26e8f7eaa1e4464f4de7fc0df39d

          SHA256

          fb5c4b42bd8fea9b06df0fd1d4d962058314d8c8dd964a1857323c7306d69b94

          SHA512

          044145fb0185fa1f4462073e7ea3b2322fbc2a82c00843dad9b038fde7232bb1091225c233fd17b54507f68d242dd017a99dcb35806cb71ba42459147c358605