Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18-07-2020 09:22

General

  • Target

    a39b1c2e8ddc2dad268963f9f1bfc2aac6d31d16b4f92dde48baa8647c7211de.exe

  • Size

    273KB

  • MD5

    7000472d579f5b4064fdef8f567ef5fb

  • SHA1

    0a111553274316844ea6a3b3f4f516593588c9ce

  • SHA256

    a39b1c2e8ddc2dad268963f9f1bfc2aac6d31d16b4f92dde48baa8647c7211de

  • SHA512

    9b84379b633b1b7abab819a3bae436ccf212a8d82932c2d9e755124a6d48aef65981245f3cbc021bbc4cc994e032eb723fe11ae255bae4c036d1acab1d4615e8

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a39b1c2e8ddc2dad268963f9f1bfc2aac6d31d16b4f92dde48baa8647c7211de.exe
    "C:\Users\Admin\AppData\Local\Temp\a39b1c2e8ddc2dad268963f9f1bfc2aac6d31d16b4f92dde48baa8647c7211de.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3676

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3676-0-0x00000000021F0000-0x00000000021FC000-memory.dmp

    Filesize

    48KB