Analysis

  • max time kernel
    143s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 14:13

General

  • Target

    4f64a9fb488ed4b2b9e05c2860525a39ea930fb3ef800f3eef8ef356bec2608d.exe

  • Size

    100KB

  • MD5

    316d6ee6f865db32b43d22c2e475788b

  • SHA1

    eede8d0950680993df79f4c3c7066b108330f20c

  • SHA256

    4f64a9fb488ed4b2b9e05c2860525a39ea930fb3ef800f3eef8ef356bec2608d

  • SHA512

    75ee4f66203102868053aaeb8bf8208500dfe0d271c10867bc489379c781914805a15e2e4e2844c926b7647e4c98d4d71b8d7107d8b394da37abc10db9765889

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f64a9fb488ed4b2b9e05c2860525a39ea930fb3ef800f3eef8ef356bec2608d.exe
    "C:\Users\Admin\AppData\Local\Temp\4f64a9fb488ed4b2b9e05c2860525a39ea930fb3ef800f3eef8ef356bec2608d.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:3216

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3216-0-0x0000000002210000-0x000000000221C000-memory.dmp
    Filesize

    48KB

  • memory/3216-1-0x0000000000400000-0x0000000000419000-memory.dmp
    Filesize

    100KB