Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
17-07-2020 20:07
Static task
static1
Behavioral task
behavioral1
Sample
648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7.exe
-
Size
276KB
-
MD5
76247154a71d3f7eb88b44766be1395f
-
SHA1
0d7d04bd5b5d2c2f8b2dd26b1594eea3ed79dd9c
-
SHA256
648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7
-
SHA512
7940c6d389fc7f8724b1dd0ef18eb1d600f9e974adb4f454a1cea3838432394f476f14d32f05aeb845239fc86cbbac9d72ca294d2b5538e15929b93d777d45b6
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7.exepid process 3768 648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7.exe 3768 648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7.exepid process 3768 648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7.exe 3768 648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7.exe 3768 648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7.exe 3768 648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7.exe"C:\Users\Admin\AppData\Local\Temp\648b87e438385a0357c56b576bf9ae76f079ee702a27e422a5c0d9a107c453f7.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3768-0-0x0000000002270000-0x000000000227C000-memory.dmpFilesize
48KB