Analysis

  • max time kernel
    135s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    29-07-2020 04:49

General

  • Target

    emotet_e3_c5931de5c1ad9d16b235ff7ce7c0b8f4205dcd14a81baa2aa06fc7b9d2ebdcfb_2020-07-29__044905._doc.doc

  • Size

    169KB

  • MD5

    9f5be860db79be5d740d988924108958

  • SHA1

    85c878bc802d5b5615ff54a1375c55691ad778df

  • SHA256

    c5931de5c1ad9d16b235ff7ce7c0b8f4205dcd14a81baa2aa06fc7b9d2ebdcfb

  • SHA512

    91d64ccb1f4c530910623e83b6c103a96544e3fba96f04c9fb2e658f690b940d6c99c056285769d636053218b61f67182082a198d0d1a7703add3f696c462825

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e3_c5931de5c1ad9d16b235ff7ce7c0b8f4205dcd14a81baa2aa06fc7b9d2ebdcfb_2020-07-29__044905._doc.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    PID:3588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3588-0-0x000002D660203000-0x000002D660206000-memory.dmp

    Filesize

    12KB

  • memory/3588-1-0x000002D660206000-0x000002D66020B000-memory.dmp

    Filesize

    20KB

  • memory/3588-2-0x000002D660206000-0x000002D66020B000-memory.dmp

    Filesize

    20KB

  • memory/3588-3-0x000002D660206000-0x000002D66020B000-memory.dmp

    Filesize

    20KB

  • memory/3588-4-0x000002D660203000-0x000002D660206000-memory.dmp

    Filesize

    12KB

  • memory/3588-5-0x000002D65DDDB000-0x000002D65DDE0000-memory.dmp

    Filesize

    20KB

  • memory/3588-6-0x000002D6603AC000-0x000002D6603B1000-memory.dmp

    Filesize

    20KB

  • memory/3588-7-0x000002D6603B1000-0x000002D6603B6000-memory.dmp

    Filesize

    20KB

  • memory/3588-8-0x000002D6603AC000-0x000002D6603B1000-memory.dmp

    Filesize

    20KB