Analysis

  • max time kernel
    3s
  • max time network
    5s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-01-2021 05:54

General

  • Target

    emotet_e2_1d60cf7a5a88c9b4a1b2c9ea649413891cd78db09b85027981ec9491cb954e1b_2021-01-13__055146500164._doc.doc

  • Size

    157KB

  • MD5

    291a7c60009acbf393623d048bd5f48f

  • SHA1

    a694d68a9f7303fb6dcc1f97d21ef25cfc22318e

  • SHA256

    1d60cf7a5a88c9b4a1b2c9ea649413891cd78db09b85027981ec9491cb954e1b

  • SHA512

    559da6be3dac860f519606e3d9f1938108f5912a821c6a8d1c027b9416576d42e6fe774132f1781e84704b45023bcc7f54206d7200a3f66ae7a844fd39098263

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e2_1d60cf7a5a88c9b4a1b2c9ea649413891cd78db09b85027981ec9491cb954e1b_2021-01-13__055146500164._doc.doc" /o ""
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4760-2-0x000002030AA60000-0x000002030B097000-memory.dmp
    Filesize

    6.2MB