Analysis

  • max time kernel
    110s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    19-07-2020 12:28

General

  • Target

    567918d08cb736d315360c2ffaa9d1e7feb715b172464b37674f43975b406a30.exe

  • Size

    100KB

  • MD5

    a1e92f262967fc5eb1c0bdf708fd0152

  • SHA1

    7ca4eae74c3910a4f4b220e25f48502de6c71a25

  • SHA256

    567918d08cb736d315360c2ffaa9d1e7feb715b172464b37674f43975b406a30

  • SHA512

    3899bf492d73b17f6567d54564389431a8dc9c1d5dbbf475c6990d06f869911f1a90a0304d8090f9beb1a6505b952a98d8238439fad5847a52b2ba9351b29213

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\567918d08cb736d315360c2ffaa9d1e7feb715b172464b37674f43975b406a30.exe
    "C:\Users\Admin\AppData\Local\Temp\567918d08cb736d315360c2ffaa9d1e7feb715b172464b37674f43975b406a30.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:2116

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2116-0-0x0000000002400000-0x000000000240C000-memory.dmp

    Filesize

    48KB