Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 11:13

General

  • Target

    ff4cf12581f078c32735447a84821f13b18b2ab5bb0725eac1a381fd5cefc668.exe

  • Size

    10.0MB

  • MD5

    b83869e68b123a2caa33611a5653ca0d

  • SHA1

    b6821c78c54207def4730b1da98e076c9d1a2f1f

  • SHA256

    ff4cf12581f078c32735447a84821f13b18b2ab5bb0725eac1a381fd5cefc668

  • SHA512

    1e83e34cf8001978423bf2c16e561ba9e4e0e895574ba175765e9822d5eb6d552d5952c7263d448f4c501818023a69aa8ee3aab90788f9fe345817d98a8395ed

  • SSDEEP

    196608:/lS0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:/lRrDjtLKkOa8ps6puAktIz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff4cf12581f078c32735447a84821f13b18b2ab5bb0725eac1a381fd5cefc668.exe
    "C:\Users\Admin\AppData\Local\Temp\ff4cf12581f078c32735447a84821f13b18b2ab5bb0725eac1a381fd5cefc668.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:5084

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          6KB

          MD5

          21b191b986e5e94c1a24380e1fb9dc7f

          SHA1

          53b825850079e2905884e115af060fa25baef201

          SHA256

          f3c58f2e240c98c90d876a77b26e546098b26f40b9bc2cf7ca838c96bf3601bd

          SHA512

          70adf615fd1ceef119a0040e8a790db34b6dee43c487e98acbb1e7e2fb2041b0b420c6898169e60962cffa880a242d80e7080deba48aeb0696487951880d48e1

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          2f8541963e381823924d009e2e03ed28

          SHA1

          2717afb1af91cb78ee750855a92a762d2863d7a7

          SHA256

          d0f0cca582d2b4899444d4652b5d2fcbb460e01154e41ed42d11441a17eb01aa

          SHA512

          6ab959bd0f65d82c63f379c550ea89003ee1d705a3a7783dbdde601f773560448d842cb2668c554b801dd3bae85fb45174d72f8a675cd0f46c0fa8c36b8c7152