Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 13:11

General

  • Target

    e9ef7c1e9e792b01a7517cf4d2f2a96b6363c320fc401fd9838c095664790407.exe

  • Size

    10.9MB

  • MD5

    001b98b496a6010ac94f72b6799ecc68

  • SHA1

    7461ac65768dd2801cb324764bfd75fdf4ff943d

  • SHA256

    e9ef7c1e9e792b01a7517cf4d2f2a96b6363c320fc401fd9838c095664790407

  • SHA512

    2c45bfbe38a70eca3dd1e9f653a160134d59c8484a844c84113a0844ef1136d7cffea8c141812b903fac67388badd31bbb3134153a7a3d038e097cd923b272f2

  • SSDEEP

    196608:ubGnWW5WySSJ7PbDdh0HtQba8z1sjzkAilU4I4:uKnW6Wy5J7PbDjOQba8psjzyz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9ef7c1e9e792b01a7517cf4d2f2a96b6363c320fc401fd9838c095664790407.exe
    "C:\Users\Admin\AppData\Local\Temp\e9ef7c1e9e792b01a7517cf4d2f2a96b6363c320fc401fd9838c095664790407.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2388

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          2KB

          MD5

          3432eb76a506bb26f81c848e352edf20

          SHA1

          ee1a125cf4609141270f04fc86824556d98a0f62

          SHA256

          5ca55ccbed829899495b9d24a03357e3c92466831dd3f22ec211015485eaf95e

          SHA512

          7c0466121a11bef258c3e4e4f3c0d336430f462d483cf4cd1f7f74f7e688e29af4b057597cc8016d06061e7056879da4ed998e0f7c58fb9fb7397d79958325b8

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          9KB

          MD5

          cad468bea7cf75f8f5b0a97ade405593

          SHA1

          c2d9fc926edddbc84b29a9095c9d1f0257dda328

          SHA256

          bf3a2c6d047f7f6ee9b07be07099a68c2215e2dc52efdbac0f80cb35347d6d19

          SHA512

          63465093db1fd390c885ae2353ca7fc0bc48b53c3024ed9c4821cc37db6964abc55bab085161c942e7f541991c0fa5949e3f767878f0fa3bd1534679cae9306b

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          6487ca02f32ffb4279493a461588aeb5

          SHA1

          8de9c7f07bbe8bcc4ac93390db4f01ec554cc214

          SHA256

          9366b12240f7a0df6eeaa10173561f7e13b392a3e6bae0b5b52e212b1486e1fa

          SHA512

          d5d1a2e01c68567c22c5ef550dac8da4c47b2fae5174d0cd8d17ec3643367c65bd75da732b1668e417368bc8f5f917dcd9309176b3bc7a716ae596b18ea82900