Analysis

  • max time kernel
    98s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    19-07-2020 10:52

General

  • Target

    806255a5f0a580f2a40f0becfed92fa77571f1e7debf1feef4c9724022e17982.exe

  • Size

    100KB

  • MD5

    6808946e6f0fdd4d7fa7ad1bfe4bf1a7

  • SHA1

    c583a10f650c2c94bed8493f425a661c11fc33b3

  • SHA256

    806255a5f0a580f2a40f0becfed92fa77571f1e7debf1feef4c9724022e17982

  • SHA512

    6df1b34d517537738cea35fca3777b5d4acd025eb2d0ee598a75eaa0603315f273b99d9a22bd3dcac29bbaf4fe41972861077ba65c2cadccddf8a4deb48d58da

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\806255a5f0a580f2a40f0becfed92fa77571f1e7debf1feef4c9724022e17982.exe
    "C:\Users\Admin\AppData\Local\Temp\806255a5f0a580f2a40f0becfed92fa77571f1e7debf1feef4c9724022e17982.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:2916

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2916-0-0x00000000022D0000-0x00000000022DC000-memory.dmp

    Filesize

    48KB