Analysis
-
max time kernel
62s -
max time network
126s -
platform
windows10_x64 -
resource
win10 -
submitted
17-07-2020 15:57
Static task
static1
Behavioral task
behavioral1
Sample
dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe
-
Size
228KB
-
MD5
d46686f18fba66303ea6549340a5a5f1
-
SHA1
703747eaba038a584706895a851562049baa9548
-
SHA256
dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93
-
SHA512
0dc48610b4a336170621126aaba2ca6ad13e8dddbc605ca34266d4b4ef23fde21c86cb4264c9e0ebf02da184d2f3957fe41c32039e51addc8e289e140ae84dba
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exepid process 2192 dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe 2192 dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exepid process 2192 dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe 2192 dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe 2192 dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe 2192 dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe"C:\Users\Admin\AppData\Local\Temp\dcc71eb5aa0c1c2658725553b9a3f8a7dec7533c48a38173cfc1cd0997744e93.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
PID:2192
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2192-0-0x00000000021A0000-0x00000000021AC000-memory.dmpFilesize
48KB