Analysis
-
max time kernel
68s -
max time network
122s -
platform
windows10_x64 -
resource
win10 -
submitted
17/07/2020, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
6949127e619d96e4983c61c989c8a460154166f0dca9f780efdf33899046e6c3.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6949127e619d96e4983c61c989c8a460154166f0dca9f780efdf33899046e6c3.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
6949127e619d96e4983c61c989c8a460154166f0dca9f780efdf33899046e6c3.exe
-
Size
273KB
-
MD5
94668ed0e204cf6d2495f03eddea899b
-
SHA1
ab0aa3fa6bdbd093ff8f234e4e5b98efa03936ec
-
SHA256
6949127e619d96e4983c61c989c8a460154166f0dca9f780efdf33899046e6c3
-
SHA512
b6b10704032e7569c4651e5561323035d66aa6af8df0e2c7234c6e3ed1acd2cf5e83e186acec249b48b5a1e4457307b81332eeff2d295d95eb47a47e6ca2e083
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2512 6949127e619d96e4983c61c989c8a460154166f0dca9f780efdf33899046e6c3.exe 2512 6949127e619d96e4983c61c989c8a460154166f0dca9f780efdf33899046e6c3.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2512 6949127e619d96e4983c61c989c8a460154166f0dca9f780efdf33899046e6c3.exe 2512 6949127e619d96e4983c61c989c8a460154166f0dca9f780efdf33899046e6c3.exe 2512 6949127e619d96e4983c61c989c8a460154166f0dca9f780efdf33899046e6c3.exe 2512 6949127e619d96e4983c61c989c8a460154166f0dca9f780efdf33899046e6c3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6949127e619d96e4983c61c989c8a460154166f0dca9f780efdf33899046e6c3.exe"C:\Users\Admin\AppData\Local\Temp\6949127e619d96e4983c61c989c8a460154166f0dca9f780efdf33899046e6c3.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
PID:2512