Analysis
-
max time kernel
62s -
max time network
126s -
platform
windows10_x64 -
resource
win10 -
submitted
17-07-2020 15:57
Static task
static1
Behavioral task
behavioral1
Sample
dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe
-
Size
228KB
-
MD5
d46686f18fba66303ea6549340a5a5f1
-
SHA1
703747eaba038a584706895a851562049baa9548
-
SHA256
dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93
-
SHA512
0dc48610b4a336170621126aaba2ca6ad13e8dddbc605ca34266d4b4ef23fde21c86cb4264c9e0ebf02da184d2f3957fe41c32039e51addc8e289e140ae84dba
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2192 dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe 2192 dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2192 dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe 2192 dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe 2192 dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe 2192 dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe"C:\Users\Admin\AppData\Local\Temp\dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
PID:2192