Analysis

  • max time kernel
    136s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 10:19

General

  • Target

    2d222bfba0d51e69d0695074ca3763e8c678fd00f5ca7d9fc895903d2c616803.exe

  • Size

    273KB

  • MD5

    fd260442e6f27a28d40190888ed3b9a1

  • SHA1

    ce213279efeda5bed00829a12bc89d7f6316331b

  • SHA256

    2d222bfba0d51e69d0695074ca3763e8c678fd00f5ca7d9fc895903d2c616803

  • SHA512

    2937ec4ecb0fcace53350cb6bbf039f8871ab8ffbe4d4ee60d95abb42b14c3456eaf6fbe99d5f3336a8d9d8e3b6276f96aa869b0df3717b7f2863b27d189d74c

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d222bfba0d51e69d0695074ca3763e8c678fd00f5ca7d9fc895903d2c616803.exe
    "C:\Users\Admin\AppData\Local\Temp\2d222bfba0d51e69d0695074ca3763e8c678fd00f5ca7d9fc895903d2c616803.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:3848

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3848-0-0x0000000002330000-0x000000000233C000-memory.dmp

    Filesize

    48KB

  • memory/3848-1-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB