Analysis

  • max time kernel
    62s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-01-2021 16:08

General

  • Target

    emotet_exe_e1_421ff01b5042dfcb6d9d1c4f7f662183c8b95643a66730ec9313532b2e84732a_2021-01-13__160659.exe.dll

  • Size

    271KB

  • MD5

    c5bf1ae52c331e48c80c0cd42c769f98

  • SHA1

    961fd84f3743df730cb6d93fd30409351fa0bb58

  • SHA256

    421ff01b5042dfcb6d9d1c4f7f662183c8b95643a66730ec9313532b2e84732a

  • SHA512

    26b1f5a20153b0dcf8eb8358b4018fbc7d3d997a951651753020022640935e8f27941ab7fc589966fcb011d8b000286ac96335ef6b08af9255b586775e5e9804

Score
1/10

Malware Config

Signatures

  • Modifies registry class 13 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\emotet_exe_e1_421ff01b5042dfcb6d9d1c4f7f662183c8b95643a66730ec9313532b2e84732a_2021-01-13__160659.exe.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\emotet_exe_e1_421ff01b5042dfcb6d9d1c4f7f662183c8b95643a66730ec9313532b2e84732a_2021-01-13__160659.exe.dll
      2⤵
      • Modifies registry class
      PID:4888

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4888-2-0x0000000000000000-mapping.dmp