Analysis

  • max time kernel
    135s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    19-07-2020 08:54

General

  • Target

    7518df0454a5e32870020ec5cb4bff63ba30521f353e24ca195132f21afc49b1.exe

  • Size

    100KB

  • MD5

    6e785b04ae14acd2c5573645b64d1894

  • SHA1

    9262614e442ea64649c90bab96ef367e201e5cec

  • SHA256

    7518df0454a5e32870020ec5cb4bff63ba30521f353e24ca195132f21afc49b1

  • SHA512

    41c243d2395cc071884e553eafdfb9472cec3d058bdecd0f743a9dcfd84d59154f264d2a95c36cb70e4f68ed5f0590e94d97837b37c0c32118965ae9d4a77362

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7518df0454a5e32870020ec5cb4bff63ba30521f353e24ca195132f21afc49b1.exe
    "C:\Users\Admin\AppData\Local\Temp\7518df0454a5e32870020ec5cb4bff63ba30521f353e24ca195132f21afc49b1.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:1516

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1516-0-0x0000000002400000-0x000000000240C000-memory.dmp

    Filesize

    48KB