Analysis
-
max time kernel
65s -
max time network
124s -
platform
windows10_x64 -
resource
win10 -
submitted
18-07-2020 10:14
Static task
static1
Behavioral task
behavioral1
Sample
b769cbd6e25cc3497e40ce8494925651e3cda896d969d6d16a170b02b2fd279e.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b769cbd6e25cc3497e40ce8494925651e3cda896d969d6d16a170b02b2fd279e.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
b769cbd6e25cc3497e40ce8494925651e3cda896d969d6d16a170b02b2fd279e.exe
-
Size
273KB
-
MD5
9aa968ac1c44818114ddd6d8bb85fb00
-
SHA1
902aecce4193e9b2865ba01e626e6053004e614e
-
SHA256
b769cbd6e25cc3497e40ce8494925651e3cda896d969d6d16a170b02b2fd279e
-
SHA512
8d7846fb4b94a8e08771d87b5074def86dd4ed5978f1df457ffea54b0b1d89973a521bb1c2a05934d6513939bb9246219309a240d074ef6b3f852ce30d53e024
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3920 b769cbd6e25cc3497e40ce8494925651e3cda896d969d6d16a170b02b2fd279e.exe 3920 b769cbd6e25cc3497e40ce8494925651e3cda896d969d6d16a170b02b2fd279e.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3920 b769cbd6e25cc3497e40ce8494925651e3cda896d969d6d16a170b02b2fd279e.exe 3920 b769cbd6e25cc3497e40ce8494925651e3cda896d969d6d16a170b02b2fd279e.exe 3920 b769cbd6e25cc3497e40ce8494925651e3cda896d969d6d16a170b02b2fd279e.exe 3920 b769cbd6e25cc3497e40ce8494925651e3cda896d969d6d16a170b02b2fd279e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b769cbd6e25cc3497e40ce8494925651e3cda896d969d6d16a170b02b2fd279e.exe"C:\Users\Admin\AppData\Local\Temp\b769cbd6e25cc3497e40ce8494925651e3cda896d969d6d16a170b02b2fd279e.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
PID:3920