Analysis

  • max time kernel
    138s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18/07/2020, 04:10

General

  • Target

    8990e85a1f5ed252d23bdf6ff1713b48d208947651cf46c9fb762d6337b25153.exe

  • Size

    273KB

  • MD5

    c67fa04231f2621535ed65fcbcc57e96

  • SHA1

    6caa7de70c338aeb90fdb266a78bd35fd9833971

  • SHA256

    8990e85a1f5ed252d23bdf6ff1713b48d208947651cf46c9fb762d6337b25153

  • SHA512

    3277c6d9c1dd195f90b1d75cbb724fedb7e09ecdb515dcc5efd8f6cfe82fd7da6cdeac924fccac0cdb65f3fe3f0fe617bf7cf20020867eccd87d0e7bd17b2704

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8990e85a1f5ed252d23bdf6ff1713b48d208947651cf46c9fb762d6337b25153.exe
    "C:\Users\Admin\AppData\Local\Temp\8990e85a1f5ed252d23bdf6ff1713b48d208947651cf46c9fb762d6337b25153.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:3676

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3676-0-0x0000000002250000-0x000000000225C000-memory.dmp

          Filesize

          48KB

        • memory/3676-1-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB