Analysis
-
max time kernel
82s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-11-2020 17:50
Static task
static1
Behavioral task
behavioral1
Sample
emotet_exe_e2_440e883114d07c7101c029ff1d675cc1a174badabb01822ef53bf2d16b024eb6_2020-11-17__174954.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
emotet_exe_e2_440e883114d07c7101c029ff1d675cc1a174badabb01822ef53bf2d16b024eb6_2020-11-17__174954.exe
Resource
win10v20201028
General
-
Target
emotet_exe_e2_440e883114d07c7101c029ff1d675cc1a174badabb01822ef53bf2d16b024eb6_2020-11-17__174954.exe
-
Size
568KB
-
MD5
584047ef86f9101e9fcdd8ce3c903e8e
-
SHA1
61b963216c5e0a2c06d7c2ced62d53d3abb4aa5d
-
SHA256
440e883114d07c7101c029ff1d675cc1a174badabb01822ef53bf2d16b024eb6
-
SHA512
37ecc5255eb0ce02521f0a2a489e115382d963c3c415bb8c2fe8997b7c73e6e8361f8282bf06fe275761b0703da5b9f4f805b800c2d5cb5ad2e9462634bc4cf1
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
emotet_exe_e2_440e883114d07c7101c029ff1d675cc1a174badabb01822ef53bf2d16b024eb6_2020-11-17__174954.exepid process 4680 emotet_exe_e2_440e883114d07c7101c029ff1d675cc1a174badabb01822ef53bf2d16b024eb6_2020-11-17__174954.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\emotet_exe_e2_440e883114d07c7101c029ff1d675cc1a174badabb01822ef53bf2d16b024eb6_2020-11-17__174954.exe"C:\Users\Admin\AppData\Local\Temp\emotet_exe_e2_440e883114d07c7101c029ff1d675cc1a174badabb01822ef53bf2d16b024eb6_2020-11-17__174954.exe"1⤵
- Suspicious use of SetWindowsHookEx