Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    29-07-2020 06:32

General

  • Target

    emotet_e1_3861720e702387ead5b58b98c9d9551a84f794e3ce9c331b7855311604ad2b46_2020-07-29__063226._doc.doc

  • Size

    172KB

  • MD5

    43cd7bbc28314335d329f990508e1ff9

  • SHA1

    e557fb01bc112b785192e16f9ffd175a05776ff1

  • SHA256

    3861720e702387ead5b58b98c9d9551a84f794e3ce9c331b7855311604ad2b46

  • SHA512

    abd5d779ef88ced64127f3d7785c2968acfb8f20f76e771d7a6d60ffb491b504776051d4da34b3b86eb428aca6cc9afbcce2ab7e312fbb938e9c37ae0eea1042

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e1_3861720e702387ead5b58b98c9d9551a84f794e3ce9c331b7855311604ad2b46_2020-07-29__063226._doc.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    PID:3588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3588-0-0x000001D670C3B000-0x000001D670C3E000-memory.dmp

    Filesize

    12KB

  • memory/3588-1-0x000001D670C3E000-0x000001D670C4F000-memory.dmp

    Filesize

    68KB

  • memory/3588-2-0x000001D670C3E000-0x000001D670C4F000-memory.dmp

    Filesize

    68KB

  • memory/3588-3-0x000001D670C3E000-0x000001D670C4F000-memory.dmp

    Filesize

    68KB

  • memory/3588-4-0x000001D670C3E000-0x000001D670C4F000-memory.dmp

    Filesize

    68KB

  • memory/3588-5-0x000001D670E45000-0x000001D670E48000-memory.dmp

    Filesize

    12KB

  • memory/3588-6-0x000001D670E45000-0x000001D670E48000-memory.dmp

    Filesize

    12KB