Analysis

  • max time kernel
    62s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17-07-2020 15:57

General

  • Target

    dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe

  • Size

    228KB

  • MD5

    d46686f18fba66303ea6549340a5a5f1

  • SHA1

    703747eaba038a584706895a851562049baa9548

  • SHA256

    dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93

  • SHA512

    0dc48610b4a336170621126aaba2ca6ad13e8dddbc605ca34266d4b4ef23fde21c86cb4264c9e0ebf02da184d2f3957fe41c32039e51addc8e289e140ae84dba

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe
    "C:\Users\Admin\AppData\Local\Temp\dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:2192

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2192-0-0x00000000021A0000-0x00000000021AC000-memory.dmp

    Filesize

    48KB