Analysis

  • max time kernel
    65s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17-07-2020 21:47

General

  • Target

    f54d5e30c247e2c1b02e3705ee6d83529eed8242647588667c24bbce0cd6cccf.exe

  • Size

    276KB

  • MD5

    84957595eece4eff42bcefc5351e9ace

  • SHA1

    560cc896813eab225c281d828fe216d375ef9fd4

  • SHA256

    f54d5e30c247e2c1b02e3705ee6d83529eed8242647588667c24bbce0cd6cccf

  • SHA512

    4179d6df56bbf9bfc72ad01bee21df8d837b75ff27d5953c4fd7a8df0d79725747d02514bf27df252291b6ddec86110ff8de3f8e104f30a8e5722db5f71a8b11

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f54d5e30c247e2c1b02e3705ee6d83529eed8242647588667c24bbce0cd6cccf.exe
    "C:\Users\Admin\AppData\Local\Temp\f54d5e30c247e2c1b02e3705ee6d83529eed8242647588667c24bbce0cd6cccf.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:3920

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3920-0-0x0000000002110000-0x000000000211C000-memory.dmp

    Filesize

    48KB

  • memory/3920-1-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB