Analysis

  • max time kernel
    95s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 09:24

General

  • Target

    6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f.exe

  • Size

    7.9MB

  • MD5

    e8602f2cf9b83cacacf4f8e11d364ac7

  • SHA1

    c7efffc95747eec45b53f20091d4f3ef14e82fc5

  • SHA256

    6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f

  • SHA512

    9335fa0e93d546aab2aa7296cf4249a7ba17d9df4eb455205775cf6f486f8470fe9e2a375b5a176b849414dc6367895f4e2e60b0f97c1b96c605107719b39c4e

  • SSDEEP

    98304:Xg49ZaYwsmJdj9PfPHRCjNTEY9xFUkcVwNSHfbv/kOIhThw6Q1f+hl/hjY4+iafD:XgP34NTx9Pe20/zkOiu1f+79YRck

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f.exe
    "C:\Users\Admin\AppData\Local\Temp\6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    a9eeb1dd3f2cfe0f4c5a2f13ddf55776

    SHA1

    5e32ae387bae3d6d616df932bfc9a55f410a1c89

    SHA256

    75b0cca03217bf90c8ecbb5b30eed4a19b1167cae39a7c8a6350995e66fdd59a

    SHA512

    ed02176376d6d461233803f534b53f9c70fef0cadbf455b36df7a7008a6b299d8a1ded5863d447f3f57da3ad52eae068dd83a3d4ac1e3c35d5df942253ae6ba1

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    cf9772c9ec914736d0fc119447c7915d

    SHA1

    b59badc0aeb058bcf707a0fa509a26d086056f47

    SHA256

    e2202688f8a8307ced775cc36dbf3c08d40004b78ee042a821ea5eda3aad6c67

    SHA512

    064ef79fd0e5ebc335a8dd1377b5b5856c8c1178096d032668e26e8dc5f154e959492277036091bc00bcb2f5573cda1c042a06ae2c0ee761579b4b54b631fa9b