Analysis

  • max time kernel
    140s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    04-05-2021 23:13

General

  • Target

    c52818e53f9a22f17c2e5a8c7b5753866c4ed07c5e97ae810f08671ac7cc86e4.exe

  • Size

    812KB

  • MD5

    d01dd42b251f5d4a0b23f5a3503ee198

  • SHA1

    c53dd2d38cf9c029f5e0e536375537af8746e5a2

  • SHA256

    c52818e53f9a22f17c2e5a8c7b5753866c4ed07c5e97ae810f08671ac7cc86e4

  • SHA512

    a792190b79a2ead98810868258919859fed51af1ce8f00e5197b0c0178593f320572b6e5934675214607d7716015a7aae3e84933a342657f1a10154456b79cdf

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c52818e53f9a22f17c2e5a8c7b5753866c4ed07c5e97ae810f08671ac7cc86e4.exe
    "C:\Users\Admin\AppData\Local\Temp\c52818e53f9a22f17c2e5a8c7b5753866c4ed07c5e97ae810f08671ac7cc86e4.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:4444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4444-114-0x00000000004C0000-0x000000000060A000-memory.dmp

    Filesize

    1.3MB