Analysis

  • max time kernel
    92s
  • max time network
    130s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    19-07-2020 10:36

General

  • Target

    7d118e1e3a91aa137d974a6a76628290b2226b0df5f57509f371506b87ff6d95.exe

  • Size

    100KB

  • MD5

    8aa742b0223668a0c2df7be637bc12cf

  • SHA1

    9a775ec731b6fc788f27fe989331de1aed197a4b

  • SHA256

    7d118e1e3a91aa137d974a6a76628290b2226b0df5f57509f371506b87ff6d95

  • SHA512

    bf946f76e28f91cfd089b309918a109f44ca003da46d878a96861596b30b2670d6d30d80b6d939dd51e0fbdfefacd5446ea064a0529bd7c0fcaa7d66258d3f86

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d118e1e3a91aa137d974a6a76628290b2226b0df5f57509f371506b87ff6d95.exe
    "C:\Users\Admin\AppData\Local\Temp\7d118e1e3a91aa137d974a6a76628290b2226b0df5f57509f371506b87ff6d95.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:2564

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2564-0-0x00000000022E0000-0x00000000022EC000-memory.dmp

    Filesize

    48KB