Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 12:59

General

  • Target

    0b63432a5fbb49df790d6f4ddb2915b852a89c261282304475db98e9883408b6.exe

  • Size

    100KB

  • MD5

    c736c3c0108f4bb3b09fe7922b26e678

  • SHA1

    4ef1a179961c2774d4590719f10c2351ee5e0c02

  • SHA256

    0b63432a5fbb49df790d6f4ddb2915b852a89c261282304475db98e9883408b6

  • SHA512

    9ee89e3f5244c0b9b089e294436b641fb0e797e95257906210fbb7e694922cc10f1bf526d886aaedeee2cf19b1e6318b553adf13c366625cd5e89ad195e7a9bd

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b63432a5fbb49df790d6f4ddb2915b852a89c261282304475db98e9883408b6.exe
    "C:\Users\Admin\AppData\Local\Temp\0b63432a5fbb49df790d6f4ddb2915b852a89c261282304475db98e9883408b6.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:2612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2612-0-0x00000000022D0000-0x00000000022DC000-memory.dmp

    Filesize

    48KB

  • memory/2612-1-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB