Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2024 00:08

General

  • Target

    c2720cbfa870cdca42bfb2e3a89b88a7a6581cdd759c64dc1156dfaf367b2581.exe

  • Size

    10.0MB

  • MD5

    ee05d28389d4413519df40a034010ecf

  • SHA1

    ad459ca51eecb2f8d4abb2c34c944e3ca6e15f90

  • SHA256

    c2720cbfa870cdca42bfb2e3a89b88a7a6581cdd759c64dc1156dfaf367b2581

  • SHA512

    6bd33b4d81fc2da939390ee7c49cb4931cb4faa645f44bdd760dbc058573809a1de4c20157d1b6234419e57a42a6e4781ae887bbee196bf45d2ac8082c80c7c3

  • SSDEEP

    196608:n4NS0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:nmRrDjtLKkOa8ps6puAktIz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2720cbfa870cdca42bfb2e3a89b88a7a6581cdd759c64dc1156dfaf367b2581.exe
    "C:\Users\Admin\AppData\Local\Temp\c2720cbfa870cdca42bfb2e3a89b88a7a6581cdd759c64dc1156dfaf367b2581.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    6KB

    MD5

    3e9767862fb2ce40603af41f9cf7c09b

    SHA1

    3407cc1f636ce494a48fb3e8af576895851fcd2c

    SHA256

    3deef1833605f33f56087e61f67d26791e2258eac5d95fc134dccd29968fd543

    SHA512

    843d5b29c12c12e9bcd96ce89d53203d7a7af4b49d3f49cf623fcc583e28b84942b3adf5ba636779821d5e544f0e402e019a56895d8924975f1f321b33188402

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    fb92ec87ff3bc6daadb3676ec30d7a86

    SHA1

    5ef02c2460cbb29f56f779b3204f5fdbb83aa7fc

    SHA256

    2bb0ef462af78297ce9c3b6b6330a019071f3447ad6eaaa6d3373e0112c8cf3b

    SHA512

    7f6eabe423aa34935824f5c6eb4bf5115eb612437b5ad5b5c44d85365238681cee3f71339b6a774aa3cd971ab2ac3f346a0468c8d9595e698a95ebb6a5128b20