Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18/07/2020, 01:15

General

  • Target

    ac45f864b30ef360d2685e7928a9317515551cf88eb5e967f822a75f1e3d321b.exe

  • Size

    273KB

  • MD5

    50f3015a5186083c795ac3d7b84c8238

  • SHA1

    0e2014306d8c93d1989c2bff9963a4c4267a09f3

  • SHA256

    ac45f864b30ef360d2685e7928a9317515551cf88eb5e967f822a75f1e3d321b

  • SHA512

    a50a7cdd6fb80db3a06408e82abf08f457391b3eb91212fee3e77cdea81b9502aae904ea478340c2828d0211d003a6504e93b0c9852b163cbaa35b84c62d28ff

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac45f864b30ef360d2685e7928a9317515551cf88eb5e967f822a75f1e3d321b.exe
    "C:\Users\Admin\AppData\Local\Temp\ac45f864b30ef360d2685e7928a9317515551cf88eb5e967f822a75f1e3d321b.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:860

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/860-0-0x0000000002250000-0x000000000225C000-memory.dmp

          Filesize

          48KB

        • memory/860-1-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB