Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 02:29

General

  • Target

    2e4ed787b9695a685f73316e8ae616de5361daaba2ea1b3659139258e7cc461a.exe

  • Size

    273KB

  • MD5

    afc428cdc4087d0df18ff419f85f12d1

  • SHA1

    701a358dbdabbb629884897de719d1fec8de13f4

  • SHA256

    2e4ed787b9695a685f73316e8ae616de5361daaba2ea1b3659139258e7cc461a

  • SHA512

    81f6657d16d47b37f7a4c0a66c4fa7ed36707f8363a0ac68e8318162658b79bb8fac3005980b123d47adbca5860bbbd88bdd298a71a7e9617dd270018942f9aa

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e4ed787b9695a685f73316e8ae616de5361daaba2ea1b3659139258e7cc461a.exe
    "C:\Users\Admin\AppData\Local\Temp\2e4ed787b9695a685f73316e8ae616de5361daaba2ea1b3659139258e7cc461a.exe"
    1⤵
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:1612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1612-0-0x00000000021D0000-0x00000000021DC000-memory.dmp

    Filesize

    48KB

  • memory/1612-1-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB