Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    19-07-2020 08:42

General

  • Target

    07a6632b7f820b71c5c22bf880f354fe6b5f89aec8b99bc353ff0c326e8bde12.exe

  • Size

    100KB

  • MD5

    acbca11666490fd44664e47ee8c15818

  • SHA1

    4969a63cb19761f696357daf7d9776a6523dd3be

  • SHA256

    07a6632b7f820b71c5c22bf880f354fe6b5f89aec8b99bc353ff0c326e8bde12

  • SHA512

    5f09cc3261723b7c362dc28ccb5392d0ba785b4a5cd5f756787d7f41a1bc25869dc3cceb67cd5b0a14bbe2f879fd219c3160dc9046dcf18b1a7ce0012544a014

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07a6632b7f820b71c5c22bf880f354fe6b5f89aec8b99bc353ff0c326e8bde12.exe
    "C:\Users\Admin\AppData\Local\Temp\07a6632b7f820b71c5c22bf880f354fe6b5f89aec8b99bc353ff0c326e8bde12.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:1356

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1356-0-0x0000000001D60000-0x0000000001D6C000-memory.dmp

    Filesize

    48KB