Analysis

  • max time kernel
    69s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18-07-2020 20:04

General

  • Target

    332be12f25e285d2e47a807bff1b6c10ecc9dd28c210ebf7a9bc0a1bcffe3102.exe

  • Size

    100KB

  • MD5

    868649fd21651e77209132525048ff0f

  • SHA1

    d2a3bef245855f6b6881ed0c0c62eb69d0117971

  • SHA256

    332be12f25e285d2e47a807bff1b6c10ecc9dd28c210ebf7a9bc0a1bcffe3102

  • SHA512

    440aac722bb85df1d27d7f5c939e4114e3a9cb190fe0e376fdf284742b70b422ee5465c41a9dfc4c50511d8c9931f8b9a4adaad6ae9e89499d2ce16541ee1378

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\332be12f25e285d2e47a807bff1b6c10ecc9dd28c210ebf7a9bc0a1bcffe3102.exe
    "C:\Users\Admin\AppData\Local\Temp\332be12f25e285d2e47a807bff1b6c10ecc9dd28c210ebf7a9bc0a1bcffe3102.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:3684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3684-0-0x00000000022D0000-0x00000000022DC000-memory.dmp

    Filesize

    48KB

  • memory/3684-1-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB