Analysis

  • max time kernel
    59s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    18-07-2020 14:13

General

  • Target

    2e22522afc3241cbb447a5121d81bc515e4aa86130ea95dcc3cce906e742f287.exe

  • Size

    100KB

  • MD5

    ef47a7d0dfa622a677ea981eed08de66

  • SHA1

    9c68f334670367e932241b6e2dba9b2a20d4942d

  • SHA256

    2e22522afc3241cbb447a5121d81bc515e4aa86130ea95dcc3cce906e742f287

  • SHA512

    624d4f300bfcfbd512f28f70ae0e9951d68cea0f059ec9c74abb8c44b90320121f7aee53165a0f58323ee96cda03bfc8520f23fc7a612bd767e6c1ab3d2bd587

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e22522afc3241cbb447a5121d81bc515e4aa86130ea95dcc3cce906e742f287.exe
    "C:\Users\Admin\AppData\Local\Temp\2e22522afc3241cbb447a5121d81bc515e4aa86130ea95dcc3cce906e742f287.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:1144

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1144-0-0x0000000001C00000-0x0000000001C0C000-memory.dmp

    Filesize

    48KB

  • memory/1144-1-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB