Analysis

  • max time kernel
    117s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18-07-2020 13:33

General

  • Target

    ce971b48f711ff342245d7224f494a47e8f9130e01dbc801efa03a23b9c9dfe0.exe

  • Size

    100KB

  • MD5

    176a8c78877a24f6ea7b3fe0f769fc42

  • SHA1

    c1022e9925d7bac6a238529592e30af0ae96e6ef

  • SHA256

    ce971b48f711ff342245d7224f494a47e8f9130e01dbc801efa03a23b9c9dfe0

  • SHA512

    b6c23cbf3920a35ace5d5af6d2278efe0a64cf797e18081e1f8c76a37fe22593a60ae2a351fe08905bbbf4386119683a226b48fc558cae26969bb4488b952f8d

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce971b48f711ff342245d7224f494a47e8f9130e01dbc801efa03a23b9c9dfe0.exe
    "C:\Users\Admin\AppData\Local\Temp\ce971b48f711ff342245d7224f494a47e8f9130e01dbc801efa03a23b9c9dfe0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    PID:3060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3060-0-0x00000000022E0000-0x00000000022EC000-memory.dmp

    Filesize

    48KB

  • memory/3060-1-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB