Analysis

  • max time kernel
    26s
  • max time network
    27s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    17-11-2020 11:53

General

  • Target

    76f956e46de4025d482a36bf32c746be.exe

  • Size

    3.0MB

  • MD5

    d00d2dc2ec2d6389ac75e0c1857deb3d

  • SHA1

    e23dda13b74324e17d1e57bfe22d9a2dbc147585

  • SHA256

    897dcb74943f22535f01c0e8057793236ab6d1368aaa5463ec78705c78e4307c

  • SHA512

    79016a8755af5bc6ab5e01d92ec0109a11474a34098ca4673858f08431635bdea7d397d961d5c8a32d31f4d5e61944830a477f318278f68ffbc72a21e47b2564

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76f956e46de4025d482a36bf32c746be.exe
    "C:\Users\Admin\AppData\Local\Temp\76f956e46de4025d482a36bf32c746be.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1668

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1668-1-0x0000000008D50000-0x0000000008D61000-memory.dmp
    Filesize

    68KB

  • memory/1668-2-0x0000000008D50000-0x0000000008D61000-memory.dmp
    Filesize

    68KB

  • memory/1668-20-0x0000000008D50000-0x0000000008D61000-memory.dmp
    Filesize

    68KB

  • memory/1668-23-0x0000000008D50000-0x0000000008D61000-memory.dmp
    Filesize

    68KB

  • memory/1668-24-0x0000000008D50000-0x0000000008D61000-memory.dmp
    Filesize

    68KB