Analysis

  • max time kernel
    95s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 14:28

General

  • Target

    68adc3df41a4893895603457d202b26f5de7178da1c9263ea56715e35e1f75a0.exe

  • Size

    7.9MB

  • MD5

    e9953952c873b47cff46adcaa7e9ae21

  • SHA1

    168a1e4d936bc8b369ec2690ad93d8678e43736c

  • SHA256

    68adc3df41a4893895603457d202b26f5de7178da1c9263ea56715e35e1f75a0

  • SHA512

    7741f0cae05e4bd190eda4398afe60ba9a86ad633ae59d0f473d3b4e68a0ed4fd7facd6cd255c48c0cb03075a7d2a51be232809c68cd1a5901b760b5ac92d4fe

  • SSDEEP

    98304:Xg49ZaYwsmJdj9PfPHRCjNTEY9xFUkcVwNSHfbv/kOIhThw6Q1f+hl/hjY4+iafD:XgP34NTx9Pe20/zkOiu1f+79YRck

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68adc3df41a4893895603457d202b26f5de7178da1c9263ea56715e35e1f75a0.exe
    "C:\Users\Admin\AppData\Local\Temp\68adc3df41a4893895603457d202b26f5de7178da1c9263ea56715e35e1f75a0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    6KB

    MD5

    bd02681a47dfd3510d7f54c75b3c4e29

    SHA1

    23d382068d767f49d2b22743430849d126d7edce

    SHA256

    bea9ebac14cdde74783af7d98588cfdb605f862cbfe6806775108901f60291ec

    SHA512

    f3793065851ab42d2e689e0dd95f42f4e5d4b087942b0cc74d03f0f3c5f1da28c2ef13096503ec295d0e03c45d2d75879445b1fb617a583d21cfd0c24527ac96

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    6KB

    MD5

    1944215a7e8bd0f7d582ab252afb30c0

    SHA1

    4f520c9c9b4732ef45637b6915318241ae16cfb1

    SHA256

    40d79b4d6c8adc415c884da52bd32a5f23ae2b71bfcac8601ce1b07f42dcade5

    SHA512

    d6c95021a7e81ff1987d51714041c10c81a7ce06297c1aa5e5036a98692d988dfd9e922458875f398a009a52109822625cefe22a3de82048d5deb3b1be57bb50

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    5bd3aad64d1ce4055810555ae5a575b1

    SHA1

    ccbe05af30ff134877c8815335a7f66e67b3a2a6

    SHA256

    6d76cc62a77b64bb10969bbd729a70678ac962d8687a68e414868d09ee6a215e

    SHA512

    5faa5996be7f78e68bb743a1fc681efefa1b9cc2cfbb6ca8aa137ccdbcec5e83a85e83434bf041c47e34151892e1d7045e20ca487f8880bd23e7682ab7ddd0d7