Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 11:26

General

  • Target

    c548a7215d269e5ce651e875f40e950d55ae0b12eeae30008bef011454cea1c9.exe

  • Size

    10.9MB

  • MD5

    c5bcdd6f17a32033fffe97287dd1134d

  • SHA1

    8045e1c0b8865e206b18881e276019c1aaaa52a5

  • SHA256

    c548a7215d269e5ce651e875f40e950d55ae0b12eeae30008bef011454cea1c9

  • SHA512

    4a31a94b61dbe4921630b96e1634745a6f38c3e4c7ee7a240ced73120e03dd5f8a9a8c553213ef716413abe93298eff540e3d3252f28fa1db98cdc6cefcead40

  • SSDEEP

    196608:FUWWPa65SSJ7PbDdh0HtQba8z1sjzkAilU4I4:FUWW5J7PbDjOQba8psjzyz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c548a7215d269e5ce651e875f40e950d55ae0b12eeae30008bef011454cea1c9.exe
    "C:\Users\Admin\AppData\Local\Temp\c548a7215d269e5ce651e875f40e950d55ae0b12eeae30008bef011454cea1c9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    5KB

    MD5

    bc8952d39ac23a561bd67271bc626db9

    SHA1

    bda645bbaf9b93798ddd434fd4edc52953f77fa7

    SHA256

    ce60e233b9edf8b37b64aed12c5eac9fa8a67c71a852b8d496cc06eec3629426

    SHA512

    c8e3cf09995b702fe8fdd67b8b7efa86b9d4822598c351f2c5f7ca9ace058dec916353ddfc9f0ffe15a719b5355b11bd2a330e5317fd1932b6dbacdcaa05b968

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    9KB

    MD5

    a983921bd6de0bcaaac65cffed0d47db

    SHA1

    6376b2933714494ddae7404876edcf53ec8a292c

    SHA256

    c451b711fde65e5d74dc5c45fcafa6af95d92292a7b06edfc5e1ad07922094f9

    SHA512

    e74aace63b74ab4a3f382235e6591817d7d402a1e980c56c2cc8a596c460e5fc02685d4c5047002afc925731f7f59b41d2e41bdbea0394cea09929451311b994

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    92c2785352a12b4ef49b08b56a5fa0d9

    SHA1

    b949910b0ec0b64ec477d4788dc6a9d0d94d528a

    SHA256

    831b5fb3d92e084f5837c5a41f206661574b201ca58f30a92a1a5e4223ed407d

    SHA512

    dd364131cd6a2dd0feb1091af1c9b1e192d200cfa7aff1bd3343ffee19b69838de7801bc435efb65c321e533d092b400f703a1748e41d856c4ce7560b999bc59