Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17-07-2020 23:53

General

  • Target

    f8ffd56e58ce43b7145d79b2484b84f72463dbc6779ed651f684c58345374b07.exe

  • Size

    273KB

  • MD5

    4776edcc670bad6fbb9941ec6ac7f704

  • SHA1

    e2bde46d9031c8907d77e7acb4fbb149f9ccce6b

  • SHA256

    f8ffd56e58ce43b7145d79b2484b84f72463dbc6779ed651f684c58345374b07

  • SHA512

    7f5ebfb3ebd0e3ea7b75f1bb177dadcfd4a6612f6df75f51381417acf0d5bd8af9361c2327059a5ab9e16be6f9a8d8ef6e47fdfe3f9ce4586e4066a417c815fa

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8ffd56e58ce43b7145d79b2484b84f72463dbc6779ed651f684c58345374b07.exe
    "C:\Users\Admin\AppData\Local\Temp\f8ffd56e58ce43b7145d79b2484b84f72463dbc6779ed651f684c58345374b07.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/748-0-0x0000000002320000-0x000000000232C000-memory.dmp
    Filesize

    48KB