Analysis

  • max time kernel
    99s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 09:45

General

  • Target

    ae36e3e24e9e87f6397571f4f141d0b99dfaca30bfe3c02132f25aa02b685428.exe

  • Size

    4.7MB

  • MD5

    0d22080b975cbc08d1ac91eed0934fa6

  • SHA1

    c29afceb7d9a0cdb52913b56d1bb63e45aa624de

  • SHA256

    ae36e3e24e9e87f6397571f4f141d0b99dfaca30bfe3c02132f25aa02b685428

  • SHA512

    fb9ddd5795324c2fca161d73b4528ca5bfb21d4612c4c4393e4502ff87176bd976bac52ce828a3fdd2c02f1d3ced0123d784c3c5908bf31f930b0afad748a7b3

  • SSDEEP

    98304:shIHjWibmorLobjYXzZpvF1Ff7PKdzOJDb4v+8lz:vWibmoFzZpF7SwN0v++

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae36e3e24e9e87f6397571f4f141d0b99dfaca30bfe3c02132f25aa02b685428.exe
    "C:\Users\Admin\AppData\Local\Temp\ae36e3e24e9e87f6397571f4f141d0b99dfaca30bfe3c02132f25aa02b685428.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:5112

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          3KB

          MD5

          9032272a8f0269b420d1cc2d8e589e7c

          SHA1

          620d0b249eb5932047250922f5d1d6d0e42d9e51

          SHA256

          35ee9139c1e1bf754278823bd0ad0e0c72fe205a90dd37bf23897986987e95b8

          SHA512

          65e98703e61a66ea5003da94805ecb7006e94a08b4f00d50b93cccd3e94aef7b954f82a7368a1ad8fd81795eccc7c1d0452bb4024bf29cd86f508a6b6fb0f2a4

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          6KB

          MD5

          b03db12d92ce59e75266c076a785c176

          SHA1

          7755e02bd4338e01ec03a1ba1ccc38e43a2658d4

          SHA256

          9fd569520fbe1fa0957e4e0bc44f33a4986255558d4b597f03ab02cbac59ea8b

          SHA512

          9f4628f6bdf369b401e4ec95340b164e2cd39471bbd1354f48ce98ff982541d503e37c0a566f2fab681d6d06515cdff0457df9300625dfc78cd0cb0070428ba8

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          6ccfae4d6725d4e86a13f2b6744a0d03

          SHA1

          afa226bfae878fb63c6375acc1705165fa6ffbd2

          SHA256

          f2fe0e41154fba836d225c919cf6475cfabe8a37cf39b8803d4b8dfcdfff527d

          SHA512

          cd37022cd00f513784a3d8afdac8b6daf8b3d52639012149b5ef4d8fb970186f3aeb95d5e1d9d7d0b73bf2beb84aefef13948b075069f6d0a16e48e5deea065c