Analysis

  • max time kernel
    65s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    19-07-2020 04:26

General

  • Target

    5ed0e13d551fa5326f5b62c3562244ad6cfe8084c7a8b959fab48e2601dd5707.exe

  • Size

    100KB

  • MD5

    f7491f6b9563f3e05ef53c5408333712

  • SHA1

    23e4550415683ab60a054ff5142c21510f0c644c

  • SHA256

    5ed0e13d551fa5326f5b62c3562244ad6cfe8084c7a8b959fab48e2601dd5707

  • SHA512

    53cb47380030c988918b882ab3c74acd3d0fda44ea33683ad4441efb9da5c3678f78dbae603a81a2d2bec23e58fe9395bf0ef98785a0a16de367d86ddb563344

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ed0e13d551fa5326f5b62c3562244ad6cfe8084c7a8b959fab48e2601dd5707.exe
    "C:\Users\Admin\AppData\Local\Temp\5ed0e13d551fa5326f5b62c3562244ad6cfe8084c7a8b959fab48e2601dd5707.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3588

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3588-0-0x00000000021A0000-0x00000000021AC000-memory.dmp
    Filesize

    48KB