Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    17-07-2020 21:28

General

  • Target

    2179e0a9c4934efc975759444d05069f26b58e7a82a96f2fb9f7959018907623.exe

  • Size

    276KB

  • MD5

    29fa8d8d1145010d6c4c23bc1f5e5567

  • SHA1

    b557351a9023be8854afff13448012492be4306a

  • SHA256

    2179e0a9c4934efc975759444d05069f26b58e7a82a96f2fb9f7959018907623

  • SHA512

    a8f84afc24f9267f89bcecef778d98548e402a9eeb84e64b6270a4690563459ea963e424a34f2fe89b86bf56cd4f152b65b66dbf3f0b6d06c331926ab7b0c720

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2179e0a9c4934efc975759444d05069f26b58e7a82a96f2fb9f7959018907623.exe
    "C:\Users\Admin\AppData\Local\Temp\2179e0a9c4934efc975759444d05069f26b58e7a82a96f2fb9f7959018907623.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    PID:3008

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3008-0-0x00000000021D0000-0x00000000021DC000-memory.dmp

    Filesize

    48KB

  • memory/3008-1-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB