Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2024 12:26

General

  • Target

    e2125a5398408f940015e1469f31b0c79e6873c6a6f8385a5ad0f0cab3ddd0b9.exe

  • Size

    9.9MB

  • MD5

    67dd9221add49983c549368ec1afe1f7

  • SHA1

    9979ce34ee3da4bf2c80c53908450afdc364473e

  • SHA256

    e2125a5398408f940015e1469f31b0c79e6873c6a6f8385a5ad0f0cab3ddd0b9

  • SHA512

    c8a20bd2d502e00186bb2912209c0c2204bb3114c2f4467f8741bebb48788b7e523d952aa50dad20a80d2ef31c2a1d0c362244c01f52a53301adda77a244de44

  • SSDEEP

    196608:NfS0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:NfRrDjtLKkOa8ps6puAktIz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2125a5398408f940015e1469f31b0c79e6873c6a6f8385a5ad0f0cab3ddd0b9.exe
    "C:\Users\Admin\AppData\Local\Temp\e2125a5398408f940015e1469f31b0c79e6873c6a6f8385a5ad0f0cab3ddd0b9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    2KB

    MD5

    550dd1118b72ab1c9276bb88ef5b4495

    SHA1

    0f831685662bc8306756e65c9ca452d32413dcef

    SHA256

    8350e1906c4468b7bb049f9c334bdcf3cae2e44c33f9241af568da085325963f

    SHA512

    152c92ac6412aeefb61997fab3a6948e490a4a0efff8a361623749c1383983ae146eaefe22d914eb08a3a767293cdbe2abbbb59108e0046c20e48ab2a76aeeca

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    19f0c0becc77ec9d8b783b7664712b38

    SHA1

    d88dbd8cd4dee8fc384d7e48a27484a7eaea946c

    SHA256

    816d62c78f1944398df244b68dceeac7ee66530598a2c5bf9b47a753662ed135

    SHA512

    247c127bec8b7dc0692c3d9d94f1fb0602403d462444242364a6d24d44d3347029e0ac6d5d4414a2ec6c3819f8dcd96376443c380174efc8732a4cf0cc1a2329

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    1c9fd434d8f428317d764f4c8a870890

    SHA1

    95884acb47151ebf5a3459ec551ea19ce093c9f8

    SHA256

    184780c6bb808f8308b0597dd9303e5c0b02cd3561e6994aa99dcf54679928ab

    SHA512

    f51e41746a51c987606b9c582303c36e8dac1a34cb35fc7ee04242751791ef1aa790b4094caa137a44d7d4b310013fa4d0cb958338bd8dadf59049a4c1dd168f