Analysis

  • max time kernel
    135s
  • max time network
    133s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    28-07-2020 23:59

General

  • Target

    emotet_e3_7fd8cf613203f886b9caec1e8430aa43b9b7147296a23baed2921ef6619a481c_2020-07-28__235850._doc.doc

  • Size

    169KB

  • MD5

    40aec6f1d3556dfcd0e0c5923f21a3f8

  • SHA1

    c67c5114cce46b08c5ed37bc688f286031390e45

  • SHA256

    7fd8cf613203f886b9caec1e8430aa43b9b7147296a23baed2921ef6619a481c

  • SHA512

    e1dd23cd1076b5e368a01a6a7ce5eea7cea0b3bb941f40591aa50a4b4404dacfc63921692e521664a8f043180f963b20ff517b595ea49d81dfc8d5f900f73cc4

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e3_7fd8cf613203f886b9caec1e8430aa43b9b7147296a23baed2921ef6619a481c_2020-07-28__235850._doc.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:2920

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2920-1-0x0000020009B65000-0x0000020009B8D000-memory.dmp

    Filesize

    160KB

  • memory/2920-0-0x0000020009B65000-0x0000020009B8D000-memory.dmp

    Filesize

    160KB

  • memory/2920-2-0x0000020009B8D000-0x0000020009B92000-memory.dmp

    Filesize

    20KB

  • memory/2920-3-0x0000020009B65000-0x0000020009B8D000-memory.dmp

    Filesize

    160KB

  • memory/2920-4-0x0000020009B8D000-0x0000020009B92000-memory.dmp

    Filesize

    20KB

  • memory/2920-5-0x0000020007AD8000-0x0000020007AE9000-memory.dmp

    Filesize

    68KB

  • memory/2920-6-0x0000020009DB4000-0x0000020009DB9000-memory.dmp

    Filesize

    20KB