Analysis

  • max time kernel
    1s
  • max time network
    10s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2024, 08:32

General

  • Target

    5a0e701d0ee9f3a713968991adab52b9ba2da198821da05ae30aa0cfd29534cc.exe

  • Size

    5.1MB

  • MD5

    c2c853743e3e68a54d5e3d23587bd3d9

  • SHA1

    720959ab704b30ef2e93a62de46be7ef0256ec69

  • SHA256

    5a0e701d0ee9f3a713968991adab52b9ba2da198821da05ae30aa0cfd29534cc

  • SHA512

    40e0268e07f72ffcf9b7c7dccf96d55599168f01e26e3754850be591dfe13c22dfd54cbf37441aa8c7ed5ddea2f8de38599ce60890e96ea438120d8b9bb25376

  • SSDEEP

    98304:8HenYKGxUcl3nT86Ytacv5Se1KdzOJDb4v+u:8Hr/YtacvuwN0v+u

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a0e701d0ee9f3a713968991adab52b9ba2da198821da05ae30aa0cfd29534cc.exe
    "C:\Users\Admin\AppData\Local\Temp\5a0e701d0ee9f3a713968991adab52b9ba2da198821da05ae30aa0cfd29534cc.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1740

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          4KB

          MD5

          3e7dfa757da6eb86b9c4fa0c3255a0ef

          SHA1

          e42b0a4019a9c1231476dc4ca200a6ed52e5feb6

          SHA256

          dd4f1122f77769db3d311a42394b668771013e0a372bf1ff422123a857e20250

          SHA512

          449b62259cb887e1a35625a2e4b2f557838f2be000e7aebdd9c43c5f7fa5b6b409edd8d4910a1c56e8960b7a8dcff728c99816ad827bb50078aaaf75a3f36518

        • C:\Users\Admin\AppData\Local\Temp\yb3DCB.tmp

          Filesize

          1KB

          MD5

          165b7efaec1422eb98880be8f4d22482

          SHA1

          6230239a4853e29617fe92bb790bfe37f2de3db7

          SHA256

          6bd01ab284a02ca425777bc83d5e0ae526c34d4692d701db5f239735822d3bbf

          SHA512

          c968e3f31594ade5551ba977d63189b06b5de835905c56afc754c0deacaa337b3dc33a55962a2fb7f36fb76619cd03005af05f60206ae23b0684afe7bdbb7c95

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          d5277b9691261635bfbc29049c2c9c86

          SHA1

          00f9e8df104d4c6e7d7b7af601929435d1745c0a

          SHA256

          ed909d548fff47eef35ebc4a260bbbaba1c627ee91fdcd320c2bfe946e25fa68

          SHA512

          e7368cd5d09ef007ead952636855351ea4c83a488b9e574a5557892683c407ca584e5eefe534bf93fa9b533730cb10dc7472c5a9bdedb833c400381a436ad250

        • \Users\Admin\AppData\Local\Temp\yb3DCB.tmp

          Filesize

          9KB

          MD5

          ae65582c3344f591317291ecea40594e

          SHA1

          3ca835867c2d21b1ea7361ad78dbe30eb7fa47dc

          SHA256

          f0562b3f98e4b57f6f309081ffdca8a4d48bfee0c2fc179d992b8a2979188a2d

          SHA512

          26ec2720c44d4ac2b06e6bc78d86c0a6f26aa0621c9010e1c648e4eed4e6512b60b8a2fde401da44758a0962488fd33e222d8b2b42eea56e71e14ac787b6ae59