Analysis

  • max time kernel
    94s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 11:56

General

  • Target

    909349d8ca20ea7d8b71eb115a8057e86ea7a57c46081807d7f1ffa633293b25.exe

  • Size

    7.9MB

  • MD5

    a2cacd3811a35adf27cfa11b42f2661a

  • SHA1

    3e5f4674ab8fb0acf9d7ae7659af8d1a13ff85a9

  • SHA256

    909349d8ca20ea7d8b71eb115a8057e86ea7a57c46081807d7f1ffa633293b25

  • SHA512

    2318aad8d438b76e27e82b2d85746a72f09859c9f1e6bb93e485fcf2d60bb309f2762665faf5c2458e5ea0c1cda3715b768d45bbe437d6bb10e69be8c01f1c92

  • SSDEEP

    98304:Xg49ZaYwsmJdj9PfPHRCjNTEY9xFUkcVwNSHfbv/kOIhThw6Q1f+hl/hjY4+iafD:XgP34NTx9Pe20/zkOiu1f+79YRck

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\909349d8ca20ea7d8b71eb115a8057e86ea7a57c46081807d7f1ffa633293b25.exe
    "C:\Users\Admin\AppData\Local\Temp\909349d8ca20ea7d8b71eb115a8057e86ea7a57c46081807d7f1ffa633293b25.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:5068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    2KB

    MD5

    e85f212d4b955211fc7bf1b186bfbc57

    SHA1

    e7a026bb114b3b8d97b613534bf2523ad72f3161

    SHA256

    5faed5a4e26389ba3cee52b76fd819595c4a086658b48a8d57d4667471667a3e

    SHA512

    00aaef4e1fe73c6306bb4c4ff0121f88d11b5ffcbb7633fb994fc52f31e0a9da5a0a5b29f0c5ba67476927536302aea364ac7002a2ee60ecb034886a5068599d

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    4c67ce361d930719a8633ce6f360a2c3

    SHA1

    374220b7d8370946d902456f4dfabecae8bc6a42

    SHA256

    47136b8d32754a3224a47ae1e9d31c822b5a730cd502a41f642f85449714ba31

    SHA512

    aed5c43675d96521041781a1d8ebc5dcbfc5a40d67c41c1bbe1bbf44847e10f7ffe8f388fb1b926b2c81eb067860b8349d7c42300b7c7c96bd81a39d600354d4

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    b02b0d3d9e6715ce8949937762007297

    SHA1

    9fb477e85128c7993db6fb042efa090fc9de4d2c

    SHA256

    86183553e811bd1a45f661cd50765212d75353fb863244c24db8d490efaef8cb

    SHA512

    eace029b4091329a30cd8cda0495320d7254e98603b87c6bd74a277df9b70f16d10551311bd236d07d1a9ecafaa49a34b2f29f569d503900c6e278e47ac54dc0