Analysis

  • max time kernel
    77s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18/07/2020, 00:37

General

  • Target

    6ed0544d112c3e6a5d03bcbc4c57c2b18e0ae067084a9493bd3e5856253ca2bc.exe

  • Size

    273KB

  • MD5

    1994a65e1d66eea3cb0065adc42a6d32

  • SHA1

    2aae9069f635c4d7ec0c5ef821f14efbb44178a4

  • SHA256

    6ed0544d112c3e6a5d03bcbc4c57c2b18e0ae067084a9493bd3e5856253ca2bc

  • SHA512

    391d9d9eb325193292d03fce345114784b15006862bf43caad4e1c82e7c068a7066afb56ef3b62e9a37a42bd9e25f11bc896450e650fa9eed7c2cf8398765ad1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ed0544d112c3e6a5d03bcbc4c57c2b18e0ae067084a9493bd3e5856253ca2bc.exe
    "C:\Users\Admin\AppData\Local\Temp\6ed0544d112c3e6a5d03bcbc4c57c2b18e0ae067084a9493bd3e5856253ca2bc.exe"
    1⤵
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3912

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3912-0-0x0000000002260000-0x000000000226C000-memory.dmp

          Filesize

          48KB

        • memory/3912-1-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB