Analysis

  • max time kernel
    138s
  • max time network
    120s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 00:38

General

  • Target

    3294c2dd3fd57d07d4f2fa0991e382015ce60145599a86d9a889951cdc30661d.exe

  • Size

    273KB

  • MD5

    c6db10569f2089b9f611d35cec3dd504

  • SHA1

    c7eacdbd16fd54a88cf9ad229ab916d34e3d416e

  • SHA256

    3294c2dd3fd57d07d4f2fa0991e382015ce60145599a86d9a889951cdc30661d

  • SHA512

    e6c66ae6ab7b84a9f24a7f525b0e5b6afd0af256d76175c145ac23ef7dfa8b872d0e4ce616cf8736388d21078603ac40fbf4919d4f333590859b3a3e1fc82c92

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3294c2dd3fd57d07d4f2fa0991e382015ce60145599a86d9a889951cdc30661d.exe
    "C:\Users\Admin\AppData\Local\Temp\3294c2dd3fd57d07d4f2fa0991e382015ce60145599a86d9a889951cdc30661d.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3656

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3656-0-0x0000000002260000-0x000000000226C000-memory.dmp

    Filesize

    48KB