Analysis
-
max time kernel
42s -
max time network
49s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22-01-2021 08:17
Static task
static1
Behavioral task
behavioral1
Sample
emotet_exe_e1_4f0aebbe2bd0308a5f20f96491a8c87875b2373da050bb36f8b9fc3200dc8215_2021-01-22__081749._exe.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
emotet_exe_e1_4f0aebbe2bd0308a5f20f96491a8c87875b2373da050bb36f8b9fc3200dc8215_2021-01-22__081749._exe.dll
-
Size
346KB
-
MD5
08667fc58fec60e818c3344ed718a1dd
-
SHA1
d7419be7b98d03cb1b8976d197404a253eef5fe4
-
SHA256
4f0aebbe2bd0308a5f20f96491a8c87875b2373da050bb36f8b9fc3200dc8215
-
SHA512
90d433aa772b3b974360cd5e52c8014fd2c73a0f4330d2386fcf5b3c501050d56e4d4fa897411f16d0ed7f92e9c94d2f152ea2baf18ed357d7b28f8080b857ac
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 640 wrote to memory of 688 640 rundll32.exe rundll32.exe PID 640 wrote to memory of 688 640 rundll32.exe rundll32.exe PID 640 wrote to memory of 688 640 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\emotet_exe_e1_4f0aebbe2bd0308a5f20f96491a8c87875b2373da050bb36f8b9fc3200dc8215_2021-01-22__081749._exe.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\emotet_exe_e1_4f0aebbe2bd0308a5f20f96491a8c87875b2373da050bb36f8b9fc3200dc8215_2021-01-22__081749._exe.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/688-2-0x0000000000000000-mapping.dmp