Analysis

  • max time kernel
    121s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2023, 10:59

General

  • Target

    a4be522e7a50dae7f2827db8488574dd40160c9a9b6134b64aca40c14d840d30.exe

  • Size

    4.7MB

  • MD5

    6a80b5cd1e440023ba69a552eb7cdc1b

  • SHA1

    714a8d8459f926d0cc621560ae83d5efe0892b8c

  • SHA256

    a4be522e7a50dae7f2827db8488574dd40160c9a9b6134b64aca40c14d840d30

  • SHA512

    a8e7ec9d6294ee7d118e229db46c8e447d03f49452d0ea906aa4b1016842b81a108b0ca4e0be3c1535d598911dfd8f0a73802e9e8324a5dd285d7fdf22661cd0

  • SSDEEP

    49152:xb2XfWHdZ8BhE7K2dM3Jqfmc2jRAjY+r5u8QeKxFOJxdb4vZKVI:12XeHdZChmK2d7eRR+KdzOJDb4v+I

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4be522e7a50dae7f2827db8488574dd40160c9a9b6134b64aca40c14d840d30.exe
    "C:\Users\Admin\AppData\Local\Temp\a4be522e7a50dae7f2827db8488574dd40160c9a9b6134b64aca40c14d840d30.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    e1988d3de9cb1f94a9af001addc6048f

    SHA1

    c9e94881e242808ab95cd0e1f96bd55f89e9b748

    SHA256

    05123845c5f6545a6589041a50b847a5790ae743f3fc127b0e30cb524e34ea72

    SHA512

    4fc58404b04e3863993a1b7ca1dd2e1e5146b4fb32d895567aff12f0e3e3822b4a545c1985adfbe66bfdc5a8577499460c9b99614273e0b4d611cb883c2d1f05

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    21cd0cc46ecc911d8cd99ae60be4bd7c

    SHA1

    ac1105557b84f2bc435249f156da13c8c09f764e

    SHA256

    60acd077278986ec27b77b9a6ee905fd29fdcda1cb723c073493d1310309c811

    SHA512

    eb2f7b22d04e3a982b2a4f8d39a3e51cdc55793180e8df46ead254f7b91db1f72970fdb0f1531a1168099fcb326267f182f85015f8e81437c5703fa0cbd9f64c

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    94a6803fd2d59a41576f8dedcd9be07b

    SHA1

    abfa6c2542b73c25fd90cdeb9ec22e07fbd0d3f9

    SHA256

    dfbafd650b794ecfd2af2f7b8e0f965c8abb44ff7ee819ce1690ccfcfef73bf6

    SHA512

    d52699fac754e42ea2b8f48d76936828a4900209c3506fc532c555acefcb55308c518d0942fba7f6029696b867652d0a64a4d74d66c144a7b8a6f5a169e99a82