Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 10:32

General

  • Target

    3e2e68900315fcec7a93249b8868cb386044221adaed52bc99496512b9e7b8bf.exe

  • Size

    5.1MB

  • MD5

    01c999f199ce73330d0d6e1fd4ef169a

  • SHA1

    cd4c0643c4fdd13c443fb3e5573ab74ad8e0d731

  • SHA256

    3e2e68900315fcec7a93249b8868cb386044221adaed52bc99496512b9e7b8bf

  • SHA512

    ceda3e615c6d29a85f14d8cc754794626d259da89e6ea5b1cb5982f9e7a901d3772b9ad872f821d689f9989ed898579f6ce4f8c8bbf075cc6f89d5a5942d46fe

  • SSDEEP

    98304:8HenYKGxUcl3nT86Ytacv5Se1KdzOJDb4v+u:8Hr/YtacvuwN0v+u

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e2e68900315fcec7a93249b8868cb386044221adaed52bc99496512b9e7b8bf.exe
    "C:\Users\Admin\AppData\Local\Temp\3e2e68900315fcec7a93249b8868cb386044221adaed52bc99496512b9e7b8bf.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:5012

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          1KB

          MD5

          57f880eb402f9f693ec84577230f7692

          SHA1

          2f729f49f12703132b2a42cada3ec6fe23be25c9

          SHA256

          d5134ad26f343b4cf6e2f6c7fb5540fff74728e83422ff37fc2c9dd106cefaae

          SHA512

          69f5aaa3b9768acd319b2935b45fe5d881404a4ce52b11650193d8fea5319d4a9f43e947c885b76f73918d445626f65fd8c1568c6d637767a27fb1bf8774e580

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          7KB

          MD5

          55149601dabbdf6ad585f3c7a13509e8

          SHA1

          a90d8044d7a37245ec2ae54414811e8098904326

          SHA256

          db2be319ba4df5fb5cd4b48f60d80920b946f6320ebd07d8874cf9bc273e68a5

          SHA512

          ef0b6b163b2c43b0ea104d2e1d73f42c97b922cc4c3072d8bbd82fcbfa18975bdeb9b35c878faf5570e907021ea64f10fa32d7d3a502eaf626a75b6e2138536f

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          8200155a37ad9ace115b0dca7e84637d

          SHA1

          73e83c8ce33330163e328dea4cd1bd10840aedf6

          SHA256

          4272024d6daedf547df3098790ad1d5cc00b3db0fafd04b10fb7d1971024162b

          SHA512

          ac715acc53a3b7921b23735d0fde0bcdf2ef0450a1b60094920493bdd16ab65d57081676180ce710b1f38a24575e038fbbdc6c6c829a7b76b164ec6888864fb6