Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17-07-2020 22:13

General

  • Target

    ba6285ec8692d647755a933f895e1af2050877cf07acdc0bcdf7b101547a281f.exe

  • Size

    276KB

  • MD5

    6cfdcbbe6b65129db56dd3f2759bf51b

  • SHA1

    5e644ebdcb61740bc33e61253b26aee68953de60

  • SHA256

    ba6285ec8692d647755a933f895e1af2050877cf07acdc0bcdf7b101547a281f

  • SHA512

    bcaa5694dd9a336715a8a0a84b75b2d7c0ea9c0006ec74193ab26a4d0b47e417b9b795e09fefa6624785d40ada1e7f60f0c8f1931637b0d6de2177b7123efd5f

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba6285ec8692d647755a933f895e1af2050877cf07acdc0bcdf7b101547a281f.exe
    "C:\Users\Admin\AppData\Local\Temp\ba6285ec8692d647755a933f895e1af2050877cf07acdc0bcdf7b101547a281f.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3900-0-0x00000000021E0000-0x00000000021EC000-memory.dmp
    Filesize

    48KB