Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 19:33

General

  • Target

    c532062b8c722def1e6606de033ab1392b44ecb831de93df966f59280d26eb38.exe

  • Size

    4.7MB

  • MD5

    b9d463e865c3c9feb6540abd618f8ede

  • SHA1

    ee050ae1a3da245b0f8d2d898254380b9bf19053

  • SHA256

    c532062b8c722def1e6606de033ab1392b44ecb831de93df966f59280d26eb38

  • SHA512

    5de754f85ee1b62883ff747f973b991181f2e24b8019217a5125686a127d72fabe522c71cbaf0afa4791ec5d0244fff8779026ef54c86f4281411232ae0aed82

  • SSDEEP

    98304:ZhIHjWibmorLobjYE08GKdzOJDb4v+zlz:GWibmoZmwN0v+R

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c532062b8c722def1e6606de033ab1392b44ecb831de93df966f59280d26eb38.exe
    "C:\Users\Admin\AppData\Local\Temp\c532062b8c722def1e6606de033ab1392b44ecb831de93df966f59280d26eb38.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4284

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          1KB

          MD5

          e412ee830e5d1583f03cb72553b2243e

          SHA1

          76ee1bdc974484c38d8082f6953c77da9b13f29d

          SHA256

          2da3a00e0f46e94162620fec9b43585150eb128c711a63a88d034367c4464bf1

          SHA512

          5b34c94b6e228789908c7513532b7dbc60204c8b07655fc26329b59b3db7ff2ccb696fba63936c60810c911ccc2dae39ad90ced039a26500a9058324cd3e3ab8

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          7KB

          MD5

          3b6ec3d4f7c6f5b97ef525da81ee112b

          SHA1

          7c0b6aae04376cfdce0e553cd66e1aeaf455cf35

          SHA256

          0e387b8639ccd704d2eda19cb6caf2129bb572258a7c4529ec0a924dcda0ebc7

          SHA512

          c6a3d79e9713b8714572d253dd5324a05fbf74d245f5debcb6065a14fea025658b2dd48b5f747984f90810ecc4469468f29ce17638238f2af48a8cb0865f0669

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          98f07c8beaeae85c6ade9f18c9b732d2

          SHA1

          eb8b03fd5a0e5d48111628d88ab7bebdd58eaa5f

          SHA256

          58279c9ac0aca0c77dafc52f91c9ef974383eb6d943691c7b2e85c2272b9186f

          SHA512

          94d489acd6d76705495d319a937348903c20b89de3f8ef98d38e6fa78bc916d768b0427ce4d68c45016d0be41706855c4a73d61d267c79c2c71e899fbdabe5a4