Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18/07/2020, 02:52

General

  • Target

    468e7d3133c751e53d49b077b65605dbff90bca45e38f76ff3c4f9b3392f8a79.exe

  • Size

    273KB

  • MD5

    267a02bc2df9a19985d2a49c5a9a267c

  • SHA1

    ac79af0916536df4f5767659155bac3d52397f9b

  • SHA256

    468e7d3133c751e53d49b077b65605dbff90bca45e38f76ff3c4f9b3392f8a79

  • SHA512

    1670c252d8584a97d088df9a7dab83ca04c80047406ea1636a98e96e4eb9ba1ba281385adc3ce214d6ae5fd8435634676fb75c8daee34ae7550862a1d75baedf

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\468e7d3133c751e53d49b077b65605dbff90bca45e38f76ff3c4f9b3392f8a79.exe
    "C:\Users\Admin\AppData\Local\Temp\468e7d3133c751e53d49b077b65605dbff90bca45e38f76ff3c4f9b3392f8a79.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:3908

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3908-0-0x0000000002260000-0x000000000226C000-memory.dmp

          Filesize

          48KB

        • memory/3908-1-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB