Analysis

  • max time kernel
    128s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18/07/2020, 00:03

General

  • Target

    e9638cd0f1d144f1d99f115195c1b4486832e023afe271802be79e68a1a2bc69.exe

  • Size

    273KB

  • MD5

    069754aaf0f471f0da51863ca297a817

  • SHA1

    863cd72ee6975610c5415249b3d6c4d94b609510

  • SHA256

    e9638cd0f1d144f1d99f115195c1b4486832e023afe271802be79e68a1a2bc69

  • SHA512

    df4511101422467b44955b40d7a031891dab59f00133993516de1c48e8808b23e47a26d5b48fbaa9221cd2ac1ce2c0859ba7eacf7c49c658e2b1cf097622b4bf

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9638cd0f1d144f1d99f115195c1b4486832e023afe271802be79e68a1a2bc69.exe
    "C:\Users\Admin\AppData\Local\Temp\e9638cd0f1d144f1d99f115195c1b4486832e023afe271802be79e68a1a2bc69.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3216

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3216-0-0x0000000002250000-0x000000000225C000-memory.dmp

          Filesize

          48KB