Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 16:03

General

  • Target

    16b26cc8e7311d9680f01774f7fa6294ad2010cc58a62e8693125d4371c086d1.exe

  • Size

    10.9MB

  • MD5

    8d194659554ca4e1ec6fe19e7e5690f0

  • SHA1

    e84b2e403fb418af9f07149647a9cba56bd65ab2

  • SHA256

    16b26cc8e7311d9680f01774f7fa6294ad2010cc58a62e8693125d4371c086d1

  • SHA512

    47b4dfff550db759f0a3bc5a2a3231aab94c9599dd58db8ef62a2c2a00dd310a38e298816e34156bf083be7eca1a429138f2c5471f51be82259e26c816c0d2af

  • SSDEEP

    196608:ubGnWW5WySSJ7PbDdh0HtQba8z1sjzkAilU4I4:uKnW6Wy5J7PbDjOQba8psjzyz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16b26cc8e7311d9680f01774f7fa6294ad2010cc58a62e8693125d4371c086d1.exe
    "C:\Users\Admin\AppData\Local\Temp\16b26cc8e7311d9680f01774f7fa6294ad2010cc58a62e8693125d4371c086d1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:5000

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          2KB

          MD5

          dd8d72298d02485c06da282aca88868f

          SHA1

          17c5f3780017941356dfcf090e4f3de4c20c123a

          SHA256

          bf92e600efa7558b6dc070ba7be4186d4ff6c3e16d61537eb9b4e1c3cf30e8d5

          SHA512

          7d7cd6da7fb686ce11c0d4cd650936536d81057081734cbe1d661e6c5fc4bc8adb4f306fae3c00a0b300a508582f3efce2716b2d32bea22173b558e6e5b1c5c7

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          9KB

          MD5

          4b5ae8e4ef9083dd81b4fd8bdad0c47c

          SHA1

          f2650949943cf79a4176cf78f0dddc934bacc81a

          SHA256

          6a289ded02f990c1514ab14e2d0ed68b0b6faf76d9851cc1040227dfb1296e08

          SHA512

          93a79c93fc4402c0fa68bfea249ef5b3d8f2487046ce76f0389438b7eba5102bbc965e0bf130dd2d54f1ed6744f218b08c1be85d4b5e4a6ee5a2f069b1220efb

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          e5a4ba12edf15068c008e58e5a036500

          SHA1

          375303f31ccf37bec601e2d24be7d47109bd96d2

          SHA256

          2ae539ef8e71f14c18d929c2a02d52cc619a7dc4c281a1cd71755374e479edc9

          SHA512

          9a623a48546d3f8d73d493981011b6ca95217ed9e4f0cb4f826ead3b3dfa0f6a0c30effbb6c885a988ae7129852aaaaef9eac60020ea92be8012ed6a8bac919a