Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    19-07-2020 00:17

General

  • Target

    2a839f1c2042bfad60f6d287dcf105b1bd3ebfff279c0701876814f012fd26f4.exe

  • Size

    100KB

  • MD5

    e74eab3c4367078fc82b324f3c24280d

  • SHA1

    cc1d6a30c70102d869c57bfd54fa0473ad04d4d2

  • SHA256

    2a839f1c2042bfad60f6d287dcf105b1bd3ebfff279c0701876814f012fd26f4

  • SHA512

    a94b7d4bc242081bb9c850045ee09468beeb69d9d40726d92da98b025fd510dc25abe1826f6b5464cca886e38c1dae74e887e8c081492162b13495ddb71ed00e

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a839f1c2042bfad60f6d287dcf105b1bd3ebfff279c0701876814f012fd26f4.exe
    "C:\Users\Admin\AppData\Local\Temp\2a839f1c2042bfad60f6d287dcf105b1bd3ebfff279c0701876814f012fd26f4.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    PID:3820

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3820-0-0x0000000002210000-0x000000000221C000-memory.dmp

    Filesize

    48KB

  • memory/3820-1-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB