Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    19-07-2020 09:06

General

  • Target

    7f36b8aa53aed3535f0122f8fc7b6045a5773e685230085cc4c4fcf4275a9e42.exe

  • Size

    100KB

  • MD5

    216b31bc00e8d070ffc3c610d8299770

  • SHA1

    6fb9d3a7fb9c8191ccaa87e5f8f7b2e16b6ed135

  • SHA256

    7f36b8aa53aed3535f0122f8fc7b6045a5773e685230085cc4c4fcf4275a9e42

  • SHA512

    928df406ac4b639b8d65807ece1934acb5d1bf4414488cd1bbcb6a9e00cd8d300821fd3daf55fb6a8ced7571635bcf0263f57ee1be6e0e48bae2286e20763796

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f36b8aa53aed3535f0122f8fc7b6045a5773e685230085cc4c4fcf4275a9e42.exe
    "C:\Users\Admin\AppData\Local\Temp\7f36b8aa53aed3535f0122f8fc7b6045a5773e685230085cc4c4fcf4275a9e42.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3844

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3844-0-0x0000000002220000-0x000000000222C000-memory.dmp

    Filesize

    48KB