Analysis

  • max time kernel
    116s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17-07-2020 16:08

General

  • Target

    6ab006eea702fd61cd055452ef6128cda78f4a15a8bb4dd81d5749b4e439d94f.exe

  • Size

    228KB

  • MD5

    a3e6d6af1959158c87d4b9cc70e5597a

  • SHA1

    8b6cee536fecf7376194247c7faef0a466992ec5

  • SHA256

    6ab006eea702fd61cd055452ef6128cda78f4a15a8bb4dd81d5749b4e439d94f

  • SHA512

    7da851d58bad728cbaae72cbe713e13f1a0865fe1b04f5d3bea48faaa3ef9d363eb4edd9347d92f429674e7699d2fcfd8e52696df44c93e1540d5e000cd361f0

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ab006eea702fd61cd055452ef6128cda78f4a15a8bb4dd81d5749b4e439d94f.exe
    "C:\Users\Admin\AppData\Local\Temp\6ab006eea702fd61cd055452ef6128cda78f4a15a8bb4dd81d5749b4e439d94f.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3544

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3544-0-0x00000000022D0000-0x00000000022DC000-memory.dmp

    Filesize

    48KB