Analysis

  • max time kernel
    1s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 19:35

General

  • Target

    652a6a38f977c72de024b910d0fd77ca72ca03859eaca6bcce33acd217a12a4e.exe

  • Size

    4.3MB

  • MD5

    0d028ee24b4bad70dac095588e9b672d

  • SHA1

    c8554058204cd7db35b06a2fb526667e1ac7696e

  • SHA256

    652a6a38f977c72de024b910d0fd77ca72ca03859eaca6bcce33acd217a12a4e

  • SHA512

    4987616557e19ddfd4f6cb7848a563bdb5a964577fd27d288402ac124137482628429ccd29a0f2039f2e4081f2686389ce0776b6689ea1b17f6299229469f50d

  • SSDEEP

    49152:qMLPIdiWU/o5LcUekfbj+whw5+r5u8QeKxFOJxdb4vZKVB:bLPIAN/nUeKbj+UFKdzOJDb4v+B

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\652a6a38f977c72de024b910d0fd77ca72ca03859eaca6bcce33acd217a12a4e.exe
    "C:\Users\Admin\AppData\Local\Temp\652a6a38f977c72de024b910d0fd77ca72ca03859eaca6bcce33acd217a12a4e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2988

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    b3be907c1a303e843c9438ecceb9086d

    SHA1

    c5d65374d49c1be11e67be36ac6152d3163ae1b0

    SHA256

    fccb9814659c4958ebc8084ebb6c4be99d697d8e1a70e34ed6488ab6d85a0f6d

    SHA512

    d2a8e50d2568ff3395121164daabe15dd84342e9cf097f33efbb338d1af621809f0f3f16d9c5fed3d99def93deaefb76f9fe14b8d9c6bae61d75c7d44c9d8632

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    eb4b8f6c0eb1bf40f0898f1fa8a83645

    SHA1

    b442982970cb7dfb17f6c75963b6e7bccc7fa2a5

    SHA256

    61c511751e207d4bd5d3de246cce2bf0f8fdcec14bf0052e0dd81f5614d4ea94

    SHA512

    1342aa5c245af0a66354c1e1852b352a26360ceb7957816c1b526011d0eea00ce07cb5b7a4164acf167ee527c19fc97ec1fe04c6f00f552187094d3389a4f5a9

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    0e1fc2c9371fdbdc524df9bb0058ad82

    SHA1

    901e536c5226fbcfc452b76851b8eb073965b32b

    SHA256

    4fbc423e5cdb48f2572e344fe2ba4846c3bec2f9ebae16b3a8cfa0edae16b0db

    SHA512

    3db4952daa518109769572736da2f0e40ca0809e501fe36c140f3d442109cf4cacfbb774d7bcee625b0cf08914a4f6c19a561e1543b7eeb313e17fcf6291f71b

  • \Users\Admin\AppData\Local\Temp\yb1FFF.tmp

    Filesize

    92KB

    MD5

    7f47bcea11599580dafe532d9fc1ef8a

    SHA1

    32e99b43ef55c038bc02795db2ca058668fd91d9

    SHA256

    d31c96c67084d89622428922aba3bc5f8721e1726ea0cff4d48229d2b9458e8e

    SHA512

    61a5d17bd6c839e37f1b1fd31c5f0a31b55c315f0c7eb87bc411dc2c3930daa26c225a02e738420d0d48ac0c5a5c1a7ab2932520fc82ee485e79f580cb2f9108

  • \Users\Admin\AppData\Local\Temp\yb1FFF.tmp

    Filesize

    36KB

    MD5

    b3274e2e76b2219210c86b7b858e6f85

    SHA1

    08429e58032c6540d3be93cd6dca5f0e92053a32

    SHA256

    8ad7517650a08505b59873cb81bdc609dec20366ac87fbd7fb3867d7caaba0c3

    SHA512

    4b0101ddc5015f27bae19c990889d83810acbc3432c4217a06c201fd17a121ef82fdee4814aa078810c72723ffb0dfc9cc6af90f88840dc03ee2daea6a31a261