Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18-07-2020 04:51

General

  • Target

    584abf69d2435f4bad97e557ece4b9465c66ab0efa99827c1c301b2811bc3a06.exe

  • Size

    273KB

  • MD5

    400b18faacc5997b2ac552564c2e309d

  • SHA1

    6c3d902437827fe1dd9fde1bfdfebcdd48a99b13

  • SHA256

    584abf69d2435f4bad97e557ece4b9465c66ab0efa99827c1c301b2811bc3a06

  • SHA512

    488e70cf9b2c4f45c94f1ef06877960b206fc3053d51b6a3528d9b1c9fdc4a58689fdb65e09dac615b0c867386e9df8ece76d0d763675f499670f6da6661511a

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\584abf69d2435f4bad97e557ece4b9465c66ab0efa99827c1c301b2811bc3a06.exe
    "C:\Users\Admin\AppData\Local\Temp\584abf69d2435f4bad97e557ece4b9465c66ab0efa99827c1c301b2811bc3a06.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:4092

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4092-0-0x0000000002340000-0x000000000234C000-memory.dmp
    Filesize

    48KB

  • memory/4092-1-0x0000000000400000-0x0000000000449000-memory.dmp
    Filesize

    292KB