Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17/07/2020, 15:35

General

  • Target

    454d3f0170a0aa750253d4bf697f9fa21b8d93c8ca6625c935b30e4b18835374.exe

  • Size

    228KB

  • MD5

    efb79d095b3639e79820b08bc848e5d2

  • SHA1

    f6363211dd45c2c38b29be072312bc32dde5a2e1

  • SHA256

    454d3f0170a0aa750253d4bf697f9fa21b8d93c8ca6625c935b30e4b18835374

  • SHA512

    87ea0d98fe5e8a466e5e634da0824942f51f11d0506d2d41c943e6081460c109e27c6c3b453d834588c0110a839726a37ea361996d28213b8fd855382af2542a

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\454d3f0170a0aa750253d4bf697f9fa21b8d93c8ca6625c935b30e4b18835374.exe
    "C:\Users\Admin\AppData\Local\Temp\454d3f0170a0aa750253d4bf697f9fa21b8d93c8ca6625c935b30e4b18835374.exe"
    1⤵
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:2460

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2460-0-0x00000000021C0000-0x00000000021CC000-memory.dmp

          Filesize

          48KB

        • memory/2460-1-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB