Analysis

  • max time kernel
    129s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    19-07-2020 06:29

General

  • Target

    59104e768c430866d7c1ad9d2c9212431e4912443cb7be1f2ae6867e281700ff.exe

  • Size

    100KB

  • MD5

    dadb3d9371bc6401791f029816abddf3

  • SHA1

    0eff95544cd0d47af719d1485ac988d7f8b87abb

  • SHA256

    59104e768c430866d7c1ad9d2c9212431e4912443cb7be1f2ae6867e281700ff

  • SHA512

    809b22bde5acd430db7b964ab2893802263e5b7ba3c5f409aebb68f5ff20100789ea91dac259787e86edf82d94a1f7fa3287c055e0e1bbdd5711108d1e93aded

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59104e768c430866d7c1ad9d2c9212431e4912443cb7be1f2ae6867e281700ff.exe
    "C:\Users\Admin\AppData\Local\Temp\59104e768c430866d7c1ad9d2c9212431e4912443cb7be1f2ae6867e281700ff.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:1504

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1504-0-0x0000000002210000-0x000000000221C000-memory.dmp

    Filesize

    48KB