Analysis

  • max time kernel
    119s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18-07-2020 03:08

General

  • Target

    2a4dc910c1d1cbc9e0c44f9f7c82befa624b233d820f7400d8e09a28df0bd632.exe

  • Size

    273KB

  • MD5

    e960e5ba9a8fadbf605611913d1ea0c4

  • SHA1

    b0348edf19b14c95a908a3afefe77495031cb937

  • SHA256

    2a4dc910c1d1cbc9e0c44f9f7c82befa624b233d820f7400d8e09a28df0bd632

  • SHA512

    96e10d42f9445ae748bf84bf86be8cd647f1eb85a9275fd54bff560e5811d3398c2f81baae59a178755c3955a4b6d307b76c5f4b2c25c88d68edb83b3d903c79

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a4dc910c1d1cbc9e0c44f9f7c82befa624b233d820f7400d8e09a28df0bd632.exe
    "C:\Users\Admin\AppData\Local\Temp\2a4dc910c1d1cbc9e0c44f9f7c82befa624b233d820f7400d8e09a28df0bd632.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:3612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3612-0-0x0000000002120000-0x000000000212C000-memory.dmp

    Filesize

    48KB

  • memory/3612-1-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB