Analysis

  • max time kernel
    4s
  • max time network
    12s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    08-05-2021 21:45

General

  • Target

    f9f654ca78997157f77b18519aa64f9522f1ab8bbb2cc7b17a7603648dd5e8cc.exe

  • Size

    1.6MB

  • MD5

    fd2c3e6594caf9101f3855040328c8fa

  • SHA1

    6f9f9e9a9eba7af2bc3ebd90f444a29f0be86c80

  • SHA256

    f9f654ca78997157f77b18519aa64f9522f1ab8bbb2cc7b17a7603648dd5e8cc

  • SHA512

    81a01b11ae3f17bd3b651fdda4ff8603f6a10adc9827c5b101107f9908029521e96df1e538e206f4aa5b49fb640d5cf8f86c5ed3736d4d25f40ee89efcd9e361

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9f654ca78997157f77b18519aa64f9522f1ab8bbb2cc7b17a7603648dd5e8cc.exe
    "C:\Users\Admin\AppData\Local\Temp\f9f654ca78997157f77b18519aa64f9522f1ab8bbb2cc7b17a7603648dd5e8cc.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/980-60-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

    Filesize

    8KB

  • memory/980-61-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB