Analysis

  • max time kernel
    126s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    18-07-2020 06:58

General

  • Target

    f185cbf1ff4e32cc78c17dd8c5fb8faac89d05e15dd9a572c713fc507b321bb6.exe

  • Size

    273KB

  • MD5

    131d8cd33b7e1900f7ea678f28336619

  • SHA1

    5b5aff8c4dce7fd701ba3a6f7a53d9e61449b00d

  • SHA256

    f185cbf1ff4e32cc78c17dd8c5fb8faac89d05e15dd9a572c713fc507b321bb6

  • SHA512

    31738cb5f98ec8036a8f8aa3195d325d736466be439256b7dce028c730881b4f5b2ba4d0547da226d765304b78b638d31adb5e398e588e14b230bcbec947c9d3

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f185cbf1ff4e32cc78c17dd8c5fb8faac89d05e15dd9a572c713fc507b321bb6.exe
    "C:\Users\Admin\AppData\Local\Temp\f185cbf1ff4e32cc78c17dd8c5fb8faac89d05e15dd9a572c713fc507b321bb6.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:1628

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1628-0-0x0000000002250000-0x000000000225C000-memory.dmp

    Filesize

    48KB

  • memory/1628-1-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB