Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows10_x64 -
resource
win10 -
submitted
19-07-2020 04:48
Static task
static1
Behavioral task
behavioral1
Sample
208f54306ce28a736773a3f49de0ba17f0b67741ac117735a3342a0d4ccf4023.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
208f54306ce28a736773a3f49de0ba17f0b67741ac117735a3342a0d4ccf4023.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
208f54306ce28a736773a3f49de0ba17f0b67741ac117735a3342a0d4ccf4023.exe
-
Size
100KB
-
MD5
5d5d12a4caaa9c9e3f06f4cfb124eef9
-
SHA1
4a0c0efd007bf51d52cc2f72140ebc1de55811a5
-
SHA256
208f54306ce28a736773a3f49de0ba17f0b67741ac117735a3342a0d4ccf4023
-
SHA512
e64970022e37a5b6a9b2fa8f8b7e724ffe13cf0223f74407a06a285988d36a7cad0f544fc20c4c90dd619452c6fe6f6eb397fb98be66daedb8ebe5fc41c59f94
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2880 208f54306ce28a736773a3f49de0ba17f0b67741ac117735a3342a0d4ccf4023.exe 2880 208f54306ce28a736773a3f49de0ba17f0b67741ac117735a3342a0d4ccf4023.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2880 208f54306ce28a736773a3f49de0ba17f0b67741ac117735a3342a0d4ccf4023.exe 2880 208f54306ce28a736773a3f49de0ba17f0b67741ac117735a3342a0d4ccf4023.exe 2880 208f54306ce28a736773a3f49de0ba17f0b67741ac117735a3342a0d4ccf4023.exe 2880 208f54306ce28a736773a3f49de0ba17f0b67741ac117735a3342a0d4ccf4023.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\208f54306ce28a736773a3f49de0ba17f0b67741ac117735a3342a0d4ccf4023.exe"C:\Users\Admin\AppData\Local\Temp\208f54306ce28a736773a3f49de0ba17f0b67741ac117735a3342a0d4ccf4023.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
PID:2880