Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17-07-2020 21:39

General

  • Target

    69c07b9518f337c3a330f7d886a616174eb15a9895ba805a3fe4c4111be1f003.exe

  • Size

    276KB

  • MD5

    a56d71bded4f58c7821bb58cb10305d8

  • SHA1

    da33aba3197784e1667929caff932c479b3dfb18

  • SHA256

    69c07b9518f337c3a330f7d886a616174eb15a9895ba805a3fe4c4111be1f003

  • SHA512

    026e6f84e6e208eba75b6207795662d397207f3232bb75b03e9ff4d84a9026c1513f1ba8d828b1b7c1668db35fe9b3140553355c4a18e3e7db705cd622553a09

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69c07b9518f337c3a330f7d886a616174eb15a9895ba805a3fe4c4111be1f003.exe
    "C:\Users\Admin\AppData\Local\Temp\69c07b9518f337c3a330f7d886a616174eb15a9895ba805a3fe4c4111be1f003.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3676

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3676-0-0x0000000002260000-0x000000000226C000-memory.dmp

    Filesize

    48KB