Analysis

  • max time kernel
    117s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    17-07-2020 22:13

General

  • Target

    14d4b1c318bcf8587fc6c09b20f94ba241de866dcc27a5506314b6b24d8ff1d4.exe

  • Size

    276KB

  • MD5

    549ef5544381cd7d17c7a7fa3208e41e

  • SHA1

    8ded9f26847100c2dd789458a0a8d5d2dd0c6c6f

  • SHA256

    14d4b1c318bcf8587fc6c09b20f94ba241de866dcc27a5506314b6b24d8ff1d4

  • SHA512

    4c20eb95a17fda3291b9ba46c122a6f66d85faec8dc9f2d16744e95c312bf804637e75291a50a17355c380733b183ae3c587bcaa2399a0ac7c0a84514934e068

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14d4b1c318bcf8587fc6c09b20f94ba241de866dcc27a5506314b6b24d8ff1d4.exe
    "C:\Users\Admin\AppData\Local\Temp\14d4b1c318bcf8587fc6c09b20f94ba241de866dcc27a5506314b6b24d8ff1d4.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:2016

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2016-0-0x00000000021E0000-0x00000000021EC000-memory.dmp

    Filesize

    48KB

  • memory/2016-1-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB