Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    05-05-2021 01:02

General

  • Target

    5ad134450d430d2ed2e7f847bc15fbab797e799f9215b112c33ad9b936d781cc.exe

  • Size

    812KB

  • MD5

    9f86f6990b087efde94e452b1f47287f

  • SHA1

    8307e39907380e72ca006fa743c8448f2cddc1ac

  • SHA256

    5ad134450d430d2ed2e7f847bc15fbab797e799f9215b112c33ad9b936d781cc

  • SHA512

    a9c6d9e84efdd37ae98ccf816c60906aab0eb6fe9e45ed3ec3a75a72f7bcffa93a5f4df1c42d47d85eec5cc16dec0fb11d61f61980e2eca522ad9b10a59088f9

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ad134450d430d2ed2e7f847bc15fbab797e799f9215b112c33ad9b936d781cc.exe
    "C:\Users\Admin\AppData\Local\Temp\5ad134450d430d2ed2e7f847bc15fbab797e799f9215b112c33ad9b936d781cc.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1864

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1864-60-0x0000000076A81000-0x0000000076A83000-memory.dmp

    Filesize

    8KB

  • memory/1864-61-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB