Analysis

  • max time kernel
    136s
  • max time network
    123s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    19-07-2020 07:42

General

  • Target

    7a1663696d27e2a7524d945989c243c70b06b90954c83c2f6ed12ec561635175.exe

  • Size

    100KB

  • MD5

    25a2c75e34780be786678e54db6b65c4

  • SHA1

    49a0682cb599444ff86bc07f0d1c865bbd8a708a

  • SHA256

    7a1663696d27e2a7524d945989c243c70b06b90954c83c2f6ed12ec561635175

  • SHA512

    4f76270e66242ac45b0f0d1a9f88e72ff77c23f4bce74bc41b44bf2def3a4a73d1c5571839ed0870f11bc60c143dca5f2242a492e2a9293808c0a2c8bd0ec81c

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a1663696d27e2a7524d945989c243c70b06b90954c83c2f6ed12ec561635175.exe
    "C:\Users\Admin\AppData\Local\Temp\7a1663696d27e2a7524d945989c243c70b06b90954c83c2f6ed12ec561635175.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3912

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3912-0-0x00000000020D0000-0x00000000020DC000-memory.dmp

    Filesize

    48KB