Analysis

  • max time kernel
    66s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    17-07-2020 20:41

General

  • Target

    b59b4f62ebb52ce527023a1b015999159e28413c62e43682ea0c5f429f6c3874.exe

  • Size

    276KB

  • MD5

    2d016ad61bf19eac6521d63d23c171d9

  • SHA1

    14b754ba6a1f2aaf8be03a0750d41c5bee6dbf7b

  • SHA256

    b59b4f62ebb52ce527023a1b015999159e28413c62e43682ea0c5f429f6c3874

  • SHA512

    6122c08f7f4670d410bfcbf86ee1417532080b212bff47624237715facba8150ba6a5018c1e954e132e8274f75b20ff1f94a32937501aa842cefe8fdb67800a1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b59b4f62ebb52ce527023a1b015999159e28413c62e43682ea0c5f429f6c3874.exe
    "C:\Users\Admin\AppData\Local\Temp\b59b4f62ebb52ce527023a1b015999159e28413c62e43682ea0c5f429f6c3874.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:428

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/428-0-0x00000000021D0000-0x00000000021DC000-memory.dmp

    Filesize

    48KB