Analysis

  • max time kernel
    130s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 09:45

General

  • Target

    a2b0d4cacd4186fb5bb36e1452b0bae082b8aeb47614baf4a0b559f3164a4587.exe

  • Size

    273KB

  • MD5

    8d816d7d64f5651da1520b5c9fedde35

  • SHA1

    d6d72dcf092311b7aa3aa8b7a7a1f8784ea78b87

  • SHA256

    a2b0d4cacd4186fb5bb36e1452b0bae082b8aeb47614baf4a0b559f3164a4587

  • SHA512

    2e476af4b9a657a8d11bdf299b29df8aee3f308ae674b9cd9c2a22563453b36963205cffeb76bd338b35017d72d8f09eafcc3239488b8aac8e3425bffb01ccde

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2b0d4cacd4186fb5bb36e1452b0bae082b8aeb47614baf4a0b559f3164a4587.exe
    "C:\Users\Admin\AppData\Local\Temp\a2b0d4cacd4186fb5bb36e1452b0bae082b8aeb47614baf4a0b559f3164a4587.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:1616

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1616-0-0x00000000021D0000-0x00000000021DC000-memory.dmp
    Filesize

    48KB