Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 06:05

General

  • Target

    3a22beabff881a1ca637124a831e0174a4b0dbd3c4a557a6655ec71e9fae95c3.exe

  • Size

    273KB

  • MD5

    9b33bc1bab68343e33bb42cd424bca25

  • SHA1

    d6c9a3570925feca2ef62bf3f3ddfa29546fea85

  • SHA256

    3a22beabff881a1ca637124a831e0174a4b0dbd3c4a557a6655ec71e9fae95c3

  • SHA512

    99ba539048c01a48b9e52c42b318f1552d3b116399e677c2268dbc0edfdc99319667aae60160ccd857ad693fcf081df5979e294b88cf7b5793dbb718bb4eef30

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a22beabff881a1ca637124a831e0174a4b0dbd3c4a557a6655ec71e9fae95c3.exe
    "C:\Users\Admin\AppData\Local\Temp\3a22beabff881a1ca637124a831e0174a4b0dbd3c4a557a6655ec71e9fae95c3.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:1740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1740-0-0x0000000002250000-0x000000000225C000-memory.dmp

    Filesize

    48KB