Analysis

  • max time kernel
    66s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 09:19

General

  • Target

    8c309ce14c15d35be3119de410e17eba572b80b626064d27f8acc106e5063c9c.exe

  • Size

    273KB

  • MD5

    202f7f7e029d677d69bdac6bdc237a14

  • SHA1

    5f4d4b27c3c580dee928b1d4cea4bfc7aa37f4c0

  • SHA256

    8c309ce14c15d35be3119de410e17eba572b80b626064d27f8acc106e5063c9c

  • SHA512

    10617279303ce3ac105dec9368fb99241cfbedf479683739dc2ee3f9e13086ac22fc7256f19ac80f6fecc89b0666f127219642975bfd4157af57554b9562d493

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c309ce14c15d35be3119de410e17eba572b80b626064d27f8acc106e5063c9c.exe
    "C:\Users\Admin\AppData\Local\Temp\8c309ce14c15d35be3119de410e17eba572b80b626064d27f8acc106e5063c9c.exe"
    1⤵
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:2556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2556-0-0x0000000002250000-0x000000000225C000-memory.dmp

    Filesize

    48KB

  • memory/2556-1-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB