Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/01/2024, 09:31

General

  • Target

    ab2d7efcc7d7c684df63d556fca3363db28cdf1ed5756457066211a345b3205e.exe

  • Size

    7.5MB

  • MD5

    6c317fb951ec9e19db1ddee6269f35ec

  • SHA1

    2a3ce4007fb250508473d1a6ab3018f0e0c32836

  • SHA256

    ab2d7efcc7d7c684df63d556fca3363db28cdf1ed5756457066211a345b3205e

  • SHA512

    7e2b72b5eea5d5d11e21c18d4ff9a7b5456e205ba516775ceb870d0a44fc49f66ca62e8de4f0b7842a0967cfc7f53fd9dd3b2ef38c4d267fa167738788ef165e

  • SSDEEP

    98304:5Bgn2qZd5Gr5aLTdAmfcXID954YOh8NbFPCQwDfWw08dGODav43c9NO:SZd5sQcXkL4YOeNly7W38NDaW8NO

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab2d7efcc7d7c684df63d556fca3363db28cdf1ed5756457066211a345b3205e.exe
    "C:\Users\Admin\AppData\Local\Temp\ab2d7efcc7d7c684df63d556fca3363db28cdf1ed5756457066211a345b3205e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2500

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          2KB

          MD5

          90f5ed1df988f8908bd08df63ba2dbe3

          SHA1

          65c84e09eef524a87376f01f9e1809078638cebe

          SHA256

          824afc69561f80c5a1a53a4dcdbd5f2d683847ff1eabb7fc2845e49725c8909f

          SHA512

          5b2446c44c0a6eb8c3f26256496b0b9960f717ae58eeddee9ae93fce1d8200f84a3f516f5cdf3b3f375d1db1adde2896620fe5da1662e072a5fad47920529817

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          6KB

          MD5

          ac009c5df319e0c02e1f25dff68d91de

          SHA1

          0188432469fef2e460713923fb09d4827b8a9139

          SHA256

          72b302fe0803fac1ded8ee96d7dde9470cff52bd5e6ebdf55b8ba852d10d60d6

          SHA512

          956f4714edddfef3abf44658c3b0ac5939dc5f1cc1e9c5a42bc5817b787dbf832cfe0a1b5c6a4bb5c9b4ce3731678991711167a505c9dae1c28b2c286f0ba6e3

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          fa3fc75b3c7becc826cf09797bcc0c42

          SHA1

          f75c7b3967cd1036f70bdacfc10c51dee405f9ad

          SHA256

          e0a761a9ee1c0779cbfef76f86cffd26509509a4444520bf22ad9b6cff8f0950

          SHA512

          26fc85154533f6e3cb77cf23f2a0995d17fb49b5b0f63537a780d4179af321bdfd4de8f80383d1a771f5e1c5e51641ede48c14832258e43816ef7f19d00e25de