Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 19:11

General

  • Target

    94315f872277dcb234a776f9da9b437c68947b7030fbdf8fcaa4ac0b3ed9e275.exe

  • Size

    11.3MB

  • MD5

    5dbe5118946ce7ec21eb8c9dd2575095

  • SHA1

    315a3fcb109c1045f4371d95121bb6238621a066

  • SHA256

    94315f872277dcb234a776f9da9b437c68947b7030fbdf8fcaa4ac0b3ed9e275

  • SHA512

    20d421004d63ad37edd1d5e510c56ea7272b1df646f2d0c07700221f0b919a5a12b7b8da3fa82b68cced898a2755aa430268c9e5f80e359a4062307fcf7847af

  • SSDEEP

    196608:RXFGPpySVf+6b9oDdh0qTRxa8z1sULDSe9a+5crvT9YqS4lU4I4:RXVuf+6poDjBTRxa8psYSUa+arvSP0z

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94315f872277dcb234a776f9da9b437c68947b7030fbdf8fcaa4ac0b3ed9e275.exe
    "C:\Users\Admin\AppData\Local\Temp\94315f872277dcb234a776f9da9b437c68947b7030fbdf8fcaa4ac0b3ed9e275.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:5008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    2KB

    MD5

    19229a5e3ae739c05f35762f099e8bb5

    SHA1

    9493f6011dd3f0162e40e2f113d3de60f1c5c74a

    SHA256

    8d5b72f16af9ec44aa6d80026c706c09c7aed35a09a4a6ee0e30520237d66567

    SHA512

    1be37af1531fbaaa6e6e83f87065b3eab6c7ba19ce05da13941f5d79f92fbecbe6f97e5e94513c29ad36ca33a5b2e92ff0df855404d6b4fb99a9e0b60de5b0e8

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    9KB

    MD5

    f9ffa2ea2149ae3f1a7501f62e8ba491

    SHA1

    480ca73413b8dc0dfc11933a87a521e6614dc90f

    SHA256

    de057874d1571ed90ff7cc191f3307ae89bcdf3361ee3e853a18ab43d78b8bdc

    SHA512

    7ba76e78f8a938587bb75b9e589b1226bd93dc4d3a7d3cd63fcb2e835e88ffd62eddb9d5054bbeb067c0bcf74f4aabf935ba4b5ebeefba4db8e21b27684ac7bc

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    3d592314394650b5497dbcbae34da47f

    SHA1

    63599b1a29a03642900c60cb61c7bbc655000508

    SHA256

    5e8e58626e1a41955c2d82f72438fed6b7442e3877f38524ea2b6b184d810f3d

    SHA512

    edd5dfebc7e250986186505e01fb041127c71e6f05f3ba3ba0449fd19c3eeab9e8a77d5e127cccd94bf7a1867be9841c8b56d3c72bb212b9b8fa113bdb6fa4e0