Analysis

  • max time kernel
    70s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    19-07-2020 08:52

General

  • Target

    d2750b74df5e7c70f9b92dcc0da274251a96c4fbde50c5bb88e0de48ce50cc27.exe

  • Size

    100KB

  • MD5

    af4d390280106a28a4f308706ad5e816

  • SHA1

    85a826824d188b2416f65c2796d999ee6521f681

  • SHA256

    d2750b74df5e7c70f9b92dcc0da274251a96c4fbde50c5bb88e0de48ce50cc27

  • SHA512

    b47b2eb9f3892441a90d265d8914a6a6d8abdabc11b8a3ba8de6018b8e91d520e23ba4d9d842b2491b252c9a5265ff524deb1a3cc7a852708797c738a8502344

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2750b74df5e7c70f9b92dcc0da274251a96c4fbde50c5bb88e0de48ce50cc27.exe
    "C:\Users\Admin\AppData\Local\Temp\d2750b74df5e7c70f9b92dcc0da274251a96c4fbde50c5bb88e0de48ce50cc27.exe"
    1⤵
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    PID:3100

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3100-0-0x0000000002210000-0x000000000221C000-memory.dmp

    Filesize

    48KB

  • memory/3100-1-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB