Analysis

  • max time kernel
    117s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17/07/2020, 19:17

General

  • Target

    47917b5fed65b0d4ef794df5f15e9ee0eb807913da2beabf9fa0c19cf2c474c0.exe

  • Size

    276KB

  • MD5

    84afeacf9b0f8527bc65d195251c7ba3

  • SHA1

    b0229539a424f8e6987458f02783ec902273b4ac

  • SHA256

    47917b5fed65b0d4ef794df5f15e9ee0eb807913da2beabf9fa0c19cf2c474c0

  • SHA512

    0ff5618a84fd7f305897cb67a80f8761b319a4e3cffd4b677f6dd8cb7961b799ee3f45c54d69cea0df6d7f1d49c3bcd6ed6658c4da9510ab96f4e218ddf6bb27

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47917b5fed65b0d4ef794df5f15e9ee0eb807913da2beabf9fa0c19cf2c474c0.exe
    "C:\Users\Admin\AppData\Local\Temp\47917b5fed65b0d4ef794df5f15e9ee0eb807913da2beabf9fa0c19cf2c474c0.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:3844

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3844-0-0x00000000021E0000-0x00000000021EC000-memory.dmp

          Filesize

          48KB

        • memory/3844-1-0x0000000000400000-0x0000000000448000-memory.dmp

          Filesize

          288KB