Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    08-05-2021 21:43

General

  • Target

    a91870a6c5aaeefc35b346eff8f89db54564a2a7ea7b1a21d6de3292e6c86aa6.exe

  • Size

    711KB

  • MD5

    f0dcfb9c79bba7f39b9456d9308617c3

  • SHA1

    0bdfffc9dc0b36796d1a2d5b0201abaabe6e7b7d

  • SHA256

    a91870a6c5aaeefc35b346eff8f89db54564a2a7ea7b1a21d6de3292e6c86aa6

  • SHA512

    f4d3e72dc85d2126c0c908bd70e41b203175d83c20dfef47067808d468b745abcf23e8a3e705983b38b1972782b6b637f62b1e14b5f5b5045dfd99ba0e53a1de

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a91870a6c5aaeefc35b346eff8f89db54564a2a7ea7b1a21d6de3292e6c86aa6.exe
    "C:\Users\Admin\AppData\Local\Temp\a91870a6c5aaeefc35b346eff8f89db54564a2a7ea7b1a21d6de3292e6c86aa6.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:508

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/508-114-0x00000000004C0000-0x000000000060A000-memory.dmp

    Filesize

    1.3MB