Analysis

  • max time kernel
    127s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 06:42

General

  • Target

    d284731028b5c616905f4bf857c6fe8a53e4270f151bfd5e1a202c5231abd863.exe

  • Size

    273KB

  • MD5

    cd32d8d417ff890235bb5f99a2dbbd67

  • SHA1

    7db76c20e97602a81f485e197172094185717984

  • SHA256

    d284731028b5c616905f4bf857c6fe8a53e4270f151bfd5e1a202c5231abd863

  • SHA512

    da9102403e8c7f70ee5d832ef53a5326506d5381d0cdde525320e97447b84c6e1ecb090518fa186b1024c54bc44b46b6b858ac41cdcfad82e3ddc7f00cead2c3

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d284731028b5c616905f4bf857c6fe8a53e4270f151bfd5e1a202c5231abd863.exe
    "C:\Users\Admin\AppData\Local\Temp\d284731028b5c616905f4bf857c6fe8a53e4270f151bfd5e1a202c5231abd863.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:1628

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1628-0-0x0000000002260000-0x000000000226C000-memory.dmp

    Filesize

    48KB