Analysis

  • max time kernel
    78s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 18:53

General

  • Target

    d41820eefdaa1791129775fd3cdb5d498cdcb53db3d2c6f15749500706946bee.exe

  • Size

    2.3MB

  • MD5

    f1a7a5ce677f62c6c0348da326eac6e9

  • SHA1

    f465d92bbaf60937e32240650ba9880f3fe1bf35

  • SHA256

    d41820eefdaa1791129775fd3cdb5d498cdcb53db3d2c6f15749500706946bee

  • SHA512

    dfb95a6951fff5569b79660bd05167c40c69c1d04f19bf5ceb1132ff22e262c6f9e8a80984385ba5a78efdf01a4460dd06da6687bd1d622ec4a6df101d312840

  • SSDEEP

    49152:cNwN6Kc2vJH0Cnbo/COlqVjX+a2b+r5u8Qegs:u4BvJH0CnbgCOlI/Kjs

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d41820eefdaa1791129775fd3cdb5d498cdcb53db3d2c6f15749500706946bee.exe
    "C:\Users\Admin\AppData\Local\Temp\d41820eefdaa1791129775fd3cdb5d498cdcb53db3d2c6f15749500706946bee.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:5088

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    fd23798b8d75f1a1455dda75868e0d65

    SHA1

    64f786bd496a929b0516f63812ba57b5d1b59837

    SHA256

    e68dbc1b6741a0207a29d5f5b6161ca5b2e12c9c7c25340cc1030ad27734dd07

    SHA512

    91cc3f8606cd53a3e844959543d080ba38cbedf8e7cb9c0565368f3ef3d5b5f7e71eb9f3f7a5bc19456724f6ac5884bc68127612752cf7597d96661dee38341c

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    6KB

    MD5

    f9bdf3736d3eef572b9e133e55510b07

    SHA1

    86afd8def4cb583f8fd4f8db5d010db6f149e802

    SHA256

    4582d26144fa270a7738b09242e5d92235c30008eec738eeaa082c6ecbddea44

    SHA512

    c1e19f0d4fffc0c8870db16e3bdd2f3649f76cd7f0802abf341b26bc79b509b16c4b549faf52c417da3caa23ef10c622fae34fb5172ffb74fd7f945a654b3d5d

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    7f361cb9a68ec1aa28902c15b5b9ae4f

    SHA1

    e195b9857abacc1098d078e36827fb222ea116a0

    SHA256

    441c0ecc087e90a08cbab17cafb319ef76f8e887b8b1d78224e8292d07e8e7f3

    SHA512

    9b1a8e28aa9f3d4262d68f9be709a345c64662b011a0769da458b229e49afed5d872546068836b080f979d4227c97e4eb941223e64091dc958a8d1bfd5c21d0f