Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18-07-2020 09:14

General

  • Target

    9358c11310bf31180373595eea31d18b44efaa32215fa2180d2949e6ed59e4e3.exe

  • Size

    273KB

  • MD5

    07bf3cbea16488b541e7b6f6c172b6e1

  • SHA1

    8f0d39e2e91b71b2bc8ed41c4101afc17fa9e054

  • SHA256

    9358c11310bf31180373595eea31d18b44efaa32215fa2180d2949e6ed59e4e3

  • SHA512

    9b169fb08a88be3f8fa162c3f5ff043774615c1aad8baffbc2b63957658feaec6feb5b10d8854fa15d8dff73cac84fd91170925c2d13806216f8b86c66876f57

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9358c11310bf31180373595eea31d18b44efaa32215fa2180d2949e6ed59e4e3.exe
    "C:\Users\Admin\AppData\Local\Temp\9358c11310bf31180373595eea31d18b44efaa32215fa2180d2949e6ed59e4e3.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:2460

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2460-0-0x00000000021D0000-0x00000000021DC000-memory.dmp

    Filesize

    48KB