Analysis

  • max time kernel
    95s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 13:02

General

  • Target

    7b796895be0123e6e8507ce865c6d60d95f3348206a5fd1abbadcc6a73302693.exe

  • Size

    7.9MB

  • MD5

    bbb62a03b61725e5e2994f32bbf4c5c8

  • SHA1

    b94490144b1bd0a0208ab2e3a402e891fbe1e050

  • SHA256

    7b796895be0123e6e8507ce865c6d60d95f3348206a5fd1abbadcc6a73302693

  • SHA512

    a28815692255fc9b4a2b090e588903cf4af54b8c47c9235e696ff02f1cfd6e6482711dc3960fe814ef07465a4eba306e8808ce0aec78c67ba1ee0524f4d965fd

  • SSDEEP

    98304:Xg49ZaYwsmJdj9PfPHRCjNTEY9xFUkcVwNSHfbv/kOIhThw6Q1f+hl/hjY4+iafD:XgP34NTx9Pe20/zkOiu1f+79YRck

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b796895be0123e6e8507ce865c6d60d95f3348206a5fd1abbadcc6a73302693.exe
    "C:\Users\Admin\AppData\Local\Temp\7b796895be0123e6e8507ce865c6d60d95f3348206a5fd1abbadcc6a73302693.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    2KB

    MD5

    5663803ba9c51a999fff8025fb68ec9b

    SHA1

    8dd04ee34e3c08a0d11b1da092b3e2f9c780aa56

    SHA256

    c74e3fa9b8ae059bf6f45e9a177be7457d8ef511c1bf54393e53459e876ba183

    SHA512

    9f77fbd2474a433246674a370bff5cf2c9e5098aa9d38c54c7518384c02a12e549b450601ec92a40e7ad9558ab64ac3c5c1f2651f35c410039f4258737961d5e

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    80f0cddad47754ba69b2e2adbe2474ac

    SHA1

    123bc5f0fb910ba00578f13ae742cee4b6fc4079

    SHA256

    c35d0c397b0a4d5b772cfb7ce5340970adfafb74339dca384fc8a78ca88932ce

    SHA512

    bb2f1b63732fd84c505f0176a64a361e0d910532aa6931a0eb5977a1b775182723ffa1a695c6724cdf5a7fc1bf14f6602bc26f85394b825f7194185b8ba79f6c

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    df255ec6c21677ee002054352c972b0d

    SHA1

    5c80ed6813935cc258ad6364033d86080efbc5c5

    SHA256

    f1f47d0cc3602a530bbb200b7fc961b6272a5e486e80e805213130f75331fb00

    SHA512

    459190b998a891cd90f3d3b566420e38c4d5027885c09808c33295cdd6815b910d1a68f3765009e9918386dffacd8d2c6bd7ad9f5542a2113807075a3a29555a