Analysis

  • max time kernel
    12s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 12:48

General

  • Target

    3fbdbd39d47841a63a85f8432c94a63b978a0a9e34107fee36e5502e1a167cc3.exe

  • Size

    4.9MB

  • MD5

    db30015c9c8ed1006fbde0414cb74d4d

  • SHA1

    5679739bc3dbe99a736df95a3cbf60389d7dc44d

  • SHA256

    3fbdbd39d47841a63a85f8432c94a63b978a0a9e34107fee36e5502e1a167cc3

  • SHA512

    40cc472327e577593cc9289f1372fce21c403cae4e5bc7a180899575fe563ba121d446daef58c5962e162d54f09694b814b754a1e45b27a77bff55eef557ea8b

  • SSDEEP

    98304:u6QfxPOKfJIO1bbjCfJZ3ciKdzOJDb4v+SA:MOKfJASwN0v+

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fbdbd39d47841a63a85f8432c94a63b978a0a9e34107fee36e5502e1a167cc3.exe
    "C:\Users\Admin\AppData\Local\Temp\3fbdbd39d47841a63a85f8432c94a63b978a0a9e34107fee36e5502e1a167cc3.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2560

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          7KB

          MD5

          e53d337596696b213b2a18c4ed1bfe8f

          SHA1

          24ba7fd4f62aab612189b498dec34fecacd68c10

          SHA256

          a0ad83e9e456162a533e43c679fbb6a61c1e860d532bfdb620e978e8ef6325b8

          SHA512

          c66f6cb7efcd9eaa176728a3354b8b74f415f0e45648226f22fc62529ada2902b4a4f5222edfeaa299649143f4d106874cf7fc62e8f8f61f2502c406ae99ec1b

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          701e95e8e87573ca771ed8b9cd8d882c

          SHA1

          dfef001dddc1b771093006cf01b73740269c1fe4

          SHA256

          e3086c68f3dae5c12f3257f29611a045ebebcd2ab7d24f0c375852641ef88b3d

          SHA512

          1194af1d783da5b491b64ebeb43e5e1724d278ed01cb131ffc71e260c265e587121914c1e0fb66c1592f2654a0c91b24c18544e45f422ffc0dd86cb0db50bf35

        • \Users\Admin\AppData\Local\Temp\yb963.tmp

          Filesize

          321KB

          MD5

          e7ae0bc17d14c02fbb0234cb62b2f567

          SHA1

          6bd8a9a8853812acee774229b9da6e28ab9bd0c9

          SHA256

          d1866f632ff8b6484751ae8d168e1c6e1c8cb45c64d028af02699a8ebeec45f2

          SHA512

          d38ecf2f6db69be606e720a7bb705bec93cbf9f2cef266c35b08ce4cf4003f5bc04187ccf27d15d128bf2db4913297c9443f5b946c1cd82c9dee2c2b3e10d9d6

        • \Users\Admin\AppData\Local\Temp\yb963.tmp

          Filesize

          283KB

          MD5

          6298c4ef25722edbc8843fc00dde25c2

          SHA1

          f63d48aa2dd339e7c638a9a7fa7c82c697d81bb0

          SHA256

          9074ce8bc4b8ce2928d17ac048179025eb72a931b0eac3d1790461e864f2e349

          SHA512

          a2afb79ac559943e2d228e7777f96874cce0c276e331aa780d311837e13de3314f4d53ea6202eb18a6f182c6caffda6c6fc96bc6211fb4a05273864efdceb1fd