Analysis

  • max time kernel
    117s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17-07-2020 16:54

General

  • Target

    ec41eecc9c02b6d00f80f6f5b06efeb5225a14505e34873dfb83ffa57cd401e0.exe

  • Size

    276KB

  • MD5

    9c21ed539dd56e58f607b9725de14091

  • SHA1

    00111c33faa8c179e349e91edc7f6aac60ffe3bf

  • SHA256

    ec41eecc9c02b6d00f80f6f5b06efeb5225a14505e34873dfb83ffa57cd401e0

  • SHA512

    ce216c8a060bb5ab2aa3aef813e49ad29023bbabc9b5e07d3b69b489cb5fe48d631b1428ddf52fcdff171d805983e01aa96b65f766113b43c733162830b48bc2

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec41eecc9c02b6d00f80f6f5b06efeb5225a14505e34873dfb83ffa57cd401e0.exe
    "C:\Users\Admin\AppData\Local\Temp\ec41eecc9c02b6d00f80f6f5b06efeb5225a14505e34873dfb83ffa57cd401e0.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:3844

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3844-0-0x0000000002270000-0x000000000227C000-memory.dmp

    Filesize

    48KB

  • memory/3844-1-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB