Analysis

  • max time kernel
    135s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    28-07-2020 20:46

General

  • Target

    emotet_e2_9ba684d3bb94c46b9c7476bf8ea2ecba98cc9e6975bb465242081e17e69ff0b1_2020-07-28__204546._doc.doc

  • Size

    170KB

  • MD5

    080c191dc1b85a5410c1edfb2532a8db

  • SHA1

    823f950745b73d548379516ed1be81e770ac0aa1

  • SHA256

    9ba684d3bb94c46b9c7476bf8ea2ecba98cc9e6975bb465242081e17e69ff0b1

  • SHA512

    a81446bc89d805b8d3ec28a08cce355710aecb3d1d39242a5b51f3f74a10656718b134a1e9dff73fe5699c36f17f0853d0ace6c5314bc69e60ee11f0af3feb72

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e2_9ba684d3bb94c46b9c7476bf8ea2ecba98cc9e6975bb465242081e17e69ff0b1_2020-07-28__204546._doc.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:2960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2960-0-0x00000251A3CE7000-0x00000251A3CEC000-memory.dmp

    Filesize

    20KB

  • memory/2960-1-0x00000251A3CE7000-0x00000251A3CEC000-memory.dmp

    Filesize

    20KB

  • memory/2960-2-0x00000251A3EE6000-0x00000251A3EEB000-memory.dmp

    Filesize

    20KB

  • memory/2960-3-0x00000251A3EE6000-0x00000251A3EEB000-memory.dmp

    Filesize

    20KB

  • memory/2960-4-0x00000251A3EE4000-0x00000251A3EE6000-memory.dmp

    Filesize

    8KB