Analysis

  • max time kernel
    131s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 05:40

General

  • Target

    4c31883537991fbe64433f6becbfd072784862e10b2cc2e10dea59de3e1b01ab.exe

  • Size

    273KB

  • MD5

    40e29ef070e5cf9a87ecf9c51b842abf

  • SHA1

    8e06c3a39e71f38b73e7a20822997a428c5007e1

  • SHA256

    4c31883537991fbe64433f6becbfd072784862e10b2cc2e10dea59de3e1b01ab

  • SHA512

    fb5858771882e3d181beb0841d0e4b18ccb1f88b45de0f5305d1814afabe885bc70f7a751f175fd51760e7cf3e0c6b67df2131e27032357a507994ba6a1b4d9a

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c31883537991fbe64433f6becbfd072784862e10b2cc2e10dea59de3e1b01ab.exe
    "C:\Users\Admin\AppData\Local\Temp\4c31883537991fbe64433f6becbfd072784862e10b2cc2e10dea59de3e1b01ab.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:1736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1736-0-0x0000000002250000-0x000000000225C000-memory.dmp

    Filesize

    48KB

  • memory/1736-1-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB