Analysis

  • max time kernel
    51s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-11-2020 20:50

General

  • Target

    8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe

  • Size

    1.5MB

  • MD5

    f7f98f7827a8eee2a8eba4542f6c4ff8

  • SHA1

    f504d82d6826cf7d8defa916f71be01a46c6db09

  • SHA256

    8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50

  • SHA512

    b6fe1a75af8bb1818ec7af6d7f98288e09466d7b7deabdd015b312c0b94942badcbd554a52042e1d2b737525b501673f5b776d0b68fb8c245730a65c3f7b5ef1

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe
    "C:\Users\Admin\AppData\Local\Temp\8a7df8323dc4eee4c43a0e0fa761af9ed98274b0923066aa82dbfa977c1e4f50.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1068

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1068-3-0x0000000000316000-0x0000000000317000-memory.dmp
    Filesize

    4KB

  • memory/1068-5-0x0000000000316000-0x0000000000317000-memory.dmp
    Filesize

    4KB

  • memory/1068-4-0x0000000000316000-0x0000000000317000-memory.dmp
    Filesize

    4KB

  • memory/1068-2-0x0000000000316000-0x0000000000317000-memory.dmp
    Filesize

    4KB