Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18-07-2020 02:10

General

  • Target

    cdb0960eccc3a39b1fcad13b679f639f2b23005a43513b628fa138ce24e58430.exe

  • Size

    273KB

  • MD5

    69cef1f0a33d2f63b396d33911a63040

  • SHA1

    3596a8d2d0d456e7ae9ccefb84601cd3419a80fe

  • SHA256

    cdb0960eccc3a39b1fcad13b679f639f2b23005a43513b628fa138ce24e58430

  • SHA512

    ea1adcc8dc6ff45314ab26993fc7e2329b6772bae194e0a930f49ece03a8cb93803e9e24ca7e26e9d6b0a5afb51e2c92297818ad1f1a8f0924a3a5be67f8ef62

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdb0960eccc3a39b1fcad13b679f639f2b23005a43513b628fa138ce24e58430.exe
    "C:\Users\Admin\AppData\Local\Temp\cdb0960eccc3a39b1fcad13b679f639f2b23005a43513b628fa138ce24e58430.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3820

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3820-0-0x0000000002250000-0x000000000225C000-memory.dmp

    Filesize

    48KB