Analysis

  • max time kernel
    148s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2024, 15:18

General

  • Target

    8e79db2c380f82e9fb7ee5065d287cc8b78c3f065d469124763c12ac8dd512f7.exe

  • Size

    4.3MB

  • MD5

    5a210ae1ec4dacd3fd3c278c5975f0bc

  • SHA1

    4a74439ce72c075874d0accb331df5ff8d1c8752

  • SHA256

    8e79db2c380f82e9fb7ee5065d287cc8b78c3f065d469124763c12ac8dd512f7

  • SHA512

    7e26b0b4c4d1fd2357fa1efd9a19af35504c82b608f017b3ffdc800da64b4dfac8ac60b8a61fff29fd0bd45f48a00d90c0dc613a359b6371524376cdba9fa32f

  • SSDEEP

    49152:qMLPIdiWU/o5LcUekfbj+whw5+r5u8QeKxFOJxdb4vZKVB:bLPIAN/nUeKbj+UFKdzOJDb4v+B

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e79db2c380f82e9fb7ee5065d287cc8b78c3f065d469124763c12ac8dd512f7.exe
    "C:\Users\Admin\AppData\Local\Temp\8e79db2c380f82e9fb7ee5065d287cc8b78c3f065d469124763c12ac8dd512f7.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4736

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          1KB

          MD5

          237ee107fc484237ac587a77371c7083

          SHA1

          95591aecd6ee2d39a340a7922e4d65892afcf1d6

          SHA256

          4bdade2fe9c95f3b941f7a49116bc2d9031698d9641962e3756d3e1f8c4c6e00

          SHA512

          12911eeef7eb177d9c66e222d395c8981fcb3e6d40eef47d33700412faa95b214db19aed90d46eabf5316b4cd4162bd930ab269b67a9f7ce9f354a7ba2adfd71

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          c4df823ec9cb17496ef898d75061fc9a

          SHA1

          c67af152e82ccb8767d6bf9ff606045c32fb0c26

          SHA256

          7793c77c16021d95be8690e9b488824c41b848a6f46bdc7ee9f40510375ee4de

          SHA512

          b28c0fa60fde3f281e2b2f66f629ee2ed05759010fa1dc6fc3a41aca44689ceb2c36b3406515b4080daa8862e2330ce157e7dbd01b2055c45b731db0c6f319e6

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          e07c68c8495b52f8322dc145a57f1967

          SHA1

          edcaf09e6695929e6f48bebfc167669bf59dd8a8

          SHA256

          6a8fc897217867f81f669cf27b46eccbe214d855c5b8410d8eee78652d6267a6

          SHA512

          ab972c6560d886aec94ee1c8155665476d022e1751875d993889d911c2c00cb66848893dd8b9cef9e6d0b5682aa89749d923dcc2714517f65311f46086bce431