Analysis

  • max time kernel
    128s
  • max time network
    121s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 23:48

General

  • Target

    86e5e5578946d9658ab53009e0a8ec1e76b51b1b2065651bea936198c1170612.exe

  • Size

    100KB

  • MD5

    9854e1f3872d1b100328d2c36734e18f

  • SHA1

    face195eb007986e6b2f803cd11596115a019ef9

  • SHA256

    86e5e5578946d9658ab53009e0a8ec1e76b51b1b2065651bea936198c1170612

  • SHA512

    338043e5d99390ad5eb0bd1d44683e0850907147b06f96fb048eca348a6078454d0a9c59996a8e2a7aa8969ed7b4f902c30a56ca10676ab360f8bb9b856b40d0

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86e5e5578946d9658ab53009e0a8ec1e76b51b1b2065651bea936198c1170612.exe
    "C:\Users\Admin\AppData\Local\Temp\86e5e5578946d9658ab53009e0a8ec1e76b51b1b2065651bea936198c1170612.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    PID:1356

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1356-0-0x0000000002220000-0x000000000222C000-memory.dmp

    Filesize

    48KB

  • memory/1356-1-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB