Analysis

  • max time kernel
    2s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2023 11:57

General

  • Target

    eaad4ca192658c5ca0f3b44d43253ab9d779241452b1a0b8151ff1f14d697504.exe

  • Size

    5.0MB

  • MD5

    75896d46eb7b28dc62c9007a24185881

  • SHA1

    b6c0775199e7afef321b4c67332c201bb3da45d7

  • SHA256

    eaad4ca192658c5ca0f3b44d43253ab9d779241452b1a0b8151ff1f14d697504

  • SHA512

    9bac20181e04258dd8f538e227a827dc9e2e34eee24823a2d1516540992496e2aca156f49c9afd3b0d4311d5dbbb8c68446dd806e74319854a32761084130b94

  • SSDEEP

    98304:zgu9llk/yHwNf3n48LYtQMKFfikjKdzOJDb4v+6Y:rllz0Yt506LwN0v+6Y

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaad4ca192658c5ca0f3b44d43253ab9d779241452b1a0b8151ff1f14d697504.exe
    "C:\Users\Admin\AppData\Local\Temp\eaad4ca192658c5ca0f3b44d43253ab9d779241452b1a0b8151ff1f14d697504.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2336

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar12EB.tmp

    Filesize

    153KB

    MD5

    870460e2aff5e0bccf723afc9ad01e86

    SHA1

    abf9d9dfbb2db7c5500904ea4533f0c89ea8fafc

    SHA256

    1fd2c71fdba2d942f1839b4b8e2d687a2e18617763aa6a21da23c2faa0f9a2bd

    SHA512

    ba417fa43f1d28675367619d5e455695a13530ef06bdb585bdb00c15cf5615a91bac8684f8563d751ad0c545e289a89d575709aa67b444dad9cae3d62e4746ae

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    1dd0e51aebf8a83489be4ba6a0172597

    SHA1

    ec0d8651ba973e00233e91f4ee5166537b7d6650

    SHA256

    eba2f034b06733c8402b955fa670d76371292347c74db8e7206e7b4ce3706945

    SHA512

    c506a96f3ac7bb2a436aa00b184ef6e469e823510c208f41657e98db24dfcb827d9499d29f43296285efe2a5023ecd661facc6e3cb902457bd89241584721e09

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    eed8c59babb76d315fdf691202d9007e

    SHA1

    54b2125663482fe55e7274b079f1c0b710f3302b

    SHA256

    173ca4f7d793a06175de5eee03ad0f1e960b1c6afe28a653c6c108baf70654f0

    SHA512

    f4a012a667003c86e0de3b44b1a6752fb0dccf67b74ba535ba01f71cc6e7c2ad79c3fb08f1c583ab9343c53a49e173d8a0a8ce2d145b181b433f47ba74a3f4a6

  • \Users\Admin\AppData\Local\Temp\ybACA.tmp

    Filesize

    114KB

    MD5

    c1725a51b2762ad18791a3c2f109348f

    SHA1

    95d6403f922a7623b791c47a67c21a8069f27191

    SHA256

    78e0df3857887b910fd1b998e369bbe1e952b40d675bee9fd60b8d0e67ddbfb4

    SHA512

    15c8403eabd33077a321293f156daed28d7bf4dea7e1e6e45b16a06f35d7cdc39374907ad2c5c3e7718f7768021f6495359fc5c962e9701fe27c6a0dbdec7072

  • \Users\Admin\AppData\Local\Temp\ybACA.tmp

    Filesize

    210KB

    MD5

    575a4040c9ddd96eb7c823bf4408a2b0

    SHA1

    70768fa969675c0753f6d38d4a2be7fb7dcff854

    SHA256

    7dd97843bd48335c60c7578b01df11f8d02459b6f80a3bab61ec8c128b513a30

    SHA512

    c9090ade956832c9525bb4e6b01430723a78456203cb393654736e8280257fe683cc3d9fa45a0117951621ca94c5860b0a7350ff12894be09ca1a8be8e97ef73