Analysis

  • max time kernel
    120s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18-07-2020 10:23

General

  • Target

    adbd0603e70c4c9872d00b3b15e04970279b40ef59d86ea3b776d1f6a88f097a.exe

  • Size

    273KB

  • MD5

    fb85be7f280292d9f95c28818718f44e

  • SHA1

    f51ff99d18f2af76a16296868fe1ea58cdacf602

  • SHA256

    adbd0603e70c4c9872d00b3b15e04970279b40ef59d86ea3b776d1f6a88f097a

  • SHA512

    8758da9138163e69dbffd802de1229d90a76b11ef212898631338cd5aed99312586772337fbb4da838cdd5fdaa3d1cb9702a7a62eb61285db6d35e85846e5923

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adbd0603e70c4c9872d00b3b15e04970279b40ef59d86ea3b776d1f6a88f097a.exe
    "C:\Users\Admin\AppData\Local\Temp\adbd0603e70c4c9872d00b3b15e04970279b40ef59d86ea3b776d1f6a88f097a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    PID:2600

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2600-0-0x0000000002440000-0x000000000244C000-memory.dmp

    Filesize

    48KB

  • memory/2600-1-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB