Analysis

  • max time kernel
    115s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17-07-2020 23:53

General

  • Target

    6f156336ce1bee10440bb3c291f8fe2717b63bae17ec93ffef4d7aff51958b4f.exe

  • Size

    273KB

  • MD5

    73605f72b5e535ea0af0d01278f0082f

  • SHA1

    081d88100869291769286090010537a6e1079a38

  • SHA256

    6f156336ce1bee10440bb3c291f8fe2717b63bae17ec93ffef4d7aff51958b4f

  • SHA512

    0f74bab8ef28b83d5fd3708747fe5965cbb151087c92cb2517971fb11212f16985c165aa67004d0d42fad6d0dece4ed97570d62d8baf1dbe186f0eb56d2fad99

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f156336ce1bee10440bb3c291f8fe2717b63bae17ec93ffef4d7aff51958b4f.exe
    "C:\Users\Admin\AppData\Local\Temp\6f156336ce1bee10440bb3c291f8fe2717b63bae17ec93ffef4d7aff51958b4f.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:3056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3056-0-0x0000000002250000-0x000000000225C000-memory.dmp

    Filesize

    48KB

  • memory/3056-1-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB