Analysis

  • max time kernel
    148s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 08:04

General

  • Target

    003e19df6462f99e26c02c46744c394d037cd2965937fbd6bcd9415ad1138fb5.exe

  • Size

    273KB

  • MD5

    9b7ce300e80d525fa07c580bfc9aa349

  • SHA1

    61f27a92d9255ce02d0a308d2e4284ef26d8b31c

  • SHA256

    003e19df6462f99e26c02c46744c394d037cd2965937fbd6bcd9415ad1138fb5

  • SHA512

    b8ee4a0e168297fcc405cf87b20b8921457077f2c02f254a0292b32f18454c7abfc123534050724de2f5bb5f0f776366e75128fb6e5358eacf11b9e63d1dd9e4

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\003e19df6462f99e26c02c46744c394d037cd2965937fbd6bcd9415ad1138fb5.exe
    "C:\Users\Admin\AppData\Local\Temp\003e19df6462f99e26c02c46744c394d037cd2965937fbd6bcd9415ad1138fb5.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3988

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3988-0-0x00000000027B0000-0x00000000027BC000-memory.dmp

    Filesize

    48KB