Analysis

  • max time kernel
    118s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17-07-2020 22:33

General

  • Target

    e822c25b3ebbff18c4189818ea8cef8d900dc14f35621598cc1eab73872be683.exe

  • Size

    273KB

  • MD5

    e644c94c605ebd1d6f194a070e88acd3

  • SHA1

    68f0d04eb3d4f615cffec7cbee21ec00bb92ded8

  • SHA256

    e822c25b3ebbff18c4189818ea8cef8d900dc14f35621598cc1eab73872be683

  • SHA512

    0f7a8f0969f1023a2bd12d515162e5f199c21d994dc1222b530e9aee75b6c1fbb0c314c4e354db32a031e9eed40608bf5c3103840deea894321fa4bd03594408

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e822c25b3ebbff18c4189818ea8cef8d900dc14f35621598cc1eab73872be683.exe
    "C:\Users\Admin\AppData\Local\Temp\e822c25b3ebbff18c4189818ea8cef8d900dc14f35621598cc1eab73872be683.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/748-0-0x0000000002320000-0x000000000232C000-memory.dmp

    Filesize

    48KB