Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    19-07-2020 01:58

General

  • Target

    6375812f5b1367ca24c540cb9af4f4f050acf58e193767596909ac3787fb69d3.exe

  • Size

    100KB

  • MD5

    f12c5cd862ca921aa23aaa0cd5630e39

  • SHA1

    91a822b0caf3279b8e80ea29597a6af30ac5bc6a

  • SHA256

    6375812f5b1367ca24c540cb9af4f4f050acf58e193767596909ac3787fb69d3

  • SHA512

    fcc032704d4b0db89d20ec220acf5c8fd12c6556df0eb5c9136f7b601707ee19bfc4a9092b38ab5d3543966b7ea3c03c196745626b78a3d43619b9f3b4444e70

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: EmotetMutantsSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6375812f5b1367ca24c540cb9af4f4f050acf58e193767596909ac3787fb69d3.exe
    "C:\Users\Admin\AppData\Local\Temp\6375812f5b1367ca24c540cb9af4f4f050acf58e193767596909ac3787fb69d3.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: EmotetMutantsSpam
    • Suspicious use of SetWindowsHookEx
    PID:3908

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3908-0-0x00000000022D0000-0x00000000022DC000-memory.dmp
    Filesize

    48KB

  • memory/3908-1-0x0000000000400000-0x0000000000419000-memory.dmp
    Filesize

    100KB