Analysis
-
max time kernel
122s -
max time network
121s -
platform
windows10_x64 -
resource
win10 -
submitted
18/07/2020, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
5b7017a1f869e21540813b6cf06f5389c1b7cecf56179367b822b2697be71cd6.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
5b7017a1f869e21540813b6cf06f5389c1b7cecf56179367b822b2697be71cd6.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
5b7017a1f869e21540813b6cf06f5389c1b7cecf56179367b822b2697be71cd6.exe
-
Size
273KB
-
MD5
523c501a4890bcd9503f02945224977d
-
SHA1
a9cd0287e4ea796cd65b6250f6c4f2b9ded5ac43
-
SHA256
5b7017a1f869e21540813b6cf06f5389c1b7cecf56179367b822b2697be71cd6
-
SHA512
1b70c62a86f8046bb28d3f18d39fb1788bb1d1423be2122625a1925ec733114a48e116fbd19bc019e92724c6743f33ab5077a97744c2a4ef2cdb05e4e34179bd
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3104 5b7017a1f869e21540813b6cf06f5389c1b7cecf56179367b822b2697be71cd6.exe 3104 5b7017a1f869e21540813b6cf06f5389c1b7cecf56179367b822b2697be71cd6.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3104 5b7017a1f869e21540813b6cf06f5389c1b7cecf56179367b822b2697be71cd6.exe 3104 5b7017a1f869e21540813b6cf06f5389c1b7cecf56179367b822b2697be71cd6.exe 3104 5b7017a1f869e21540813b6cf06f5389c1b7cecf56179367b822b2697be71cd6.exe 3104 5b7017a1f869e21540813b6cf06f5389c1b7cecf56179367b822b2697be71cd6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b7017a1f869e21540813b6cf06f5389c1b7cecf56179367b822b2697be71cd6.exe"C:\Users\Admin\AppData\Local\Temp\5b7017a1f869e21540813b6cf06f5389c1b7cecf56179367b822b2697be71cd6.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
PID:3104