Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18-07-2020 07:41

General

  • Target

    97a98aefe5b17d9995ee3d390de9f697b251c64ca6bac4e57ea3f37885f23ce2.exe

  • Size

    273KB

  • MD5

    4cf8a3d9155f0b9badb5d1f64ab63bf1

  • SHA1

    4f81da6a72680815112571ec9a31dd5d880f3997

  • SHA256

    97a98aefe5b17d9995ee3d390de9f697b251c64ca6bac4e57ea3f37885f23ce2

  • SHA512

    662a2454e5606fcfccb8ebc6da0488cb0f13dbd29311f2a370681d52135dccd3a5c24cb77ccb1d483c51341550bb270b7ebc02f3397b3f76702dd771a5942b7a

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97a98aefe5b17d9995ee3d390de9f697b251c64ca6bac4e57ea3f37885f23ce2.exe
    "C:\Users\Admin\AppData\Local\Temp\97a98aefe5b17d9995ee3d390de9f697b251c64ca6bac4e57ea3f37885f23ce2.exe"
    1⤵
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3044

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3044-0-0x0000000002250000-0x000000000225C000-memory.dmp

    Filesize

    48KB

  • memory/3044-1-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB