Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 03:17

General

  • Target

    c2d65a281b237f4335a6262cf1893a5dda24f4bab991f3b4466070be01250f58.exe

  • Size

    273KB

  • MD5

    e8dd7b1df395becbf387794286232a74

  • SHA1

    c0bff9dd1a0b49446898e61274d37b15b0f9a25f

  • SHA256

    c2d65a281b237f4335a6262cf1893a5dda24f4bab991f3b4466070be01250f58

  • SHA512

    11f66796a222cf59db451c0c812a26231430653c29383fff4bbe011efb5075ff4edc991fc1872c0088aa2443bdafde644bd761a16da2d3c53e62210106b85dcd

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2d65a281b237f4335a6262cf1893a5dda24f4bab991f3b4466070be01250f58.exe
    "C:\Users\Admin\AppData\Local\Temp\c2d65a281b237f4335a6262cf1893a5dda24f4bab991f3b4466070be01250f58.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:652

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/652-0-0x0000000002250000-0x000000000225C000-memory.dmp

    Filesize

    48KB