Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17-07-2020 17:43

General

  • Target

    c0e9a98ad450dbd1229401e640d05d886861d457abfe9e8c7470b4edfea72da6.exe

  • Size

    276KB

  • MD5

    0f21c3fe22b92e85b7bd85b7e4ac0de4

  • SHA1

    8c03c56421b3a9b130cb418dce166084bae3d175

  • SHA256

    c0e9a98ad450dbd1229401e640d05d886861d457abfe9e8c7470b4edfea72da6

  • SHA512

    e63c55929d091fc2bcf9548f44ad176381b05ed9b4ff0270acd4c462b32d42b27db253d5b02d27ed278416dae86fb117ae3ef2ab5cdcb92a76db8996e8c4da95

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0e9a98ad450dbd1229401e640d05d886861d457abfe9e8c7470b4edfea72da6.exe
    "C:\Users\Admin\AppData\Local\Temp\c0e9a98ad450dbd1229401e640d05d886861d457abfe9e8c7470b4edfea72da6.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    PID:3892

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3892-0-0x0000000002250000-0x000000000225C000-memory.dmp

    Filesize

    48KB

  • memory/3892-1-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB