Analysis

  • max time kernel
    126s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    17-07-2020 21:50

General

  • Target

    0142e0d9b2d29186ebc39120d4443d8f47c6ecd45ad486c26b41d0a079a86c30.exe

  • Size

    276KB

  • MD5

    570d1ad9bb52f9e5b66171674933c1c6

  • SHA1

    369f1ad0bece24d55360ae2947cc4955aed9826f

  • SHA256

    0142e0d9b2d29186ebc39120d4443d8f47c6ecd45ad486c26b41d0a079a86c30

  • SHA512

    0da265fbe48fb58bc96dc90283af0443f551ef7e43d6201fd068c71b9575877d8d52fa6266cbaea0c4ceadba31fb28d0c53f2a3f041893c03494ce3b6e2d6f18

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0142e0d9b2d29186ebc39120d4443d8f47c6ecd45ad486c26b41d0a079a86c30.exe
    "C:\Users\Admin\AppData\Local\Temp\0142e0d9b2d29186ebc39120d4443d8f47c6ecd45ad486c26b41d0a079a86c30.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:1612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1612-0-0x00000000021E0000-0x00000000021EC000-memory.dmp

    Filesize

    48KB

  • memory/1612-1-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB