Analysis
-
max time kernel
129s -
max time network
131s -
platform
windows10_x64 -
resource
win10 -
submitted
18-07-2020 06:53
Static task
static1
Behavioral task
behavioral1
Sample
744f105869251d41c59664ead430da90bacda8b493804a93d842cbe6b51727eb.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
744f105869251d41c59664ead430da90bacda8b493804a93d842cbe6b51727eb.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
744f105869251d41c59664ead430da90bacda8b493804a93d842cbe6b51727eb.exe
-
Size
273KB
-
MD5
41986b01d799df5fb8bbfc4f883f7e9a
-
SHA1
92d7d97ba9c6a15b8a2da0e53910396b340b5b3a
-
SHA256
744f105869251d41c59664ead430da90bacda8b493804a93d842cbe6b51727eb
-
SHA512
db67c907eb5ccf1be83236eb6538c0693e7e3c110f0aba9daf0f31dc241f08e227d22851e21847a157f692cde23e4f6a76cb3a72aea0e5691e87b0d66939d1a2
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2460 744f105869251d41c59664ead430da90bacda8b493804a93d842cbe6b51727eb.exe 2460 744f105869251d41c59664ead430da90bacda8b493804a93d842cbe6b51727eb.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2460 744f105869251d41c59664ead430da90bacda8b493804a93d842cbe6b51727eb.exe 2460 744f105869251d41c59664ead430da90bacda8b493804a93d842cbe6b51727eb.exe 2460 744f105869251d41c59664ead430da90bacda8b493804a93d842cbe6b51727eb.exe 2460 744f105869251d41c59664ead430da90bacda8b493804a93d842cbe6b51727eb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\744f105869251d41c59664ead430da90bacda8b493804a93d842cbe6b51727eb.exe"C:\Users\Admin\AppData\Local\Temp\744f105869251d41c59664ead430da90bacda8b493804a93d842cbe6b51727eb.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
PID:2460