Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18/07/2020, 01:58

General

  • Target

    6bb7392adf17e6764148b677ae7225b764b18c8f1d66a4746df20be6e75af762.exe

  • Size

    273KB

  • MD5

    b15803d1daf3b6d2511247dc4b8f8cb2

  • SHA1

    30c26ab191d9acf81a4a5eaff07cc89873049fe9

  • SHA256

    6bb7392adf17e6764148b677ae7225b764b18c8f1d66a4746df20be6e75af762

  • SHA512

    dfdcf482784aac8bfd8f1fa4cb1671ab39e26964f40941ef8076e69274efe705f76da3671cd9ef2b5c5b57ba914c8fccbac6e96fda45d8cb055c7249c5ee512e

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bb7392adf17e6764148b677ae7225b764b18c8f1d66a4746df20be6e75af762.exe
    "C:\Users\Admin\AppData\Local\Temp\6bb7392adf17e6764148b677ae7225b764b18c8f1d66a4746df20be6e75af762.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:2880

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2880-0-0x0000000002260000-0x000000000226C000-memory.dmp

          Filesize

          48KB

        • memory/2880-1-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB