Analysis

  • max time kernel
    3s
  • max time network
    12s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    08-05-2021 21:14

General

  • Target

    c187b2ae3566973a18a0725d38d53f6dd5ac59ac1abcf0e11d8054fa348e9739.exe

  • Size

    812KB

  • MD5

    a21a90eb43feff51c742372cebe72f3c

  • SHA1

    af9b58a4296c720422fe02da5755d1de04dcde28

  • SHA256

    c187b2ae3566973a18a0725d38d53f6dd5ac59ac1abcf0e11d8054fa348e9739

  • SHA512

    65b4eb058dbeb72c482aed952212465121d945a8b9fb64a544d2c309c008fd57266c026b3deaf23c6ba3ae8093bdf4a7ea0eb583210bebbdd72165c1c5792a11

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c187b2ae3566973a18a0725d38d53f6dd5ac59ac1abcf0e11d8054fa348e9739.exe
    "C:\Users\Admin\AppData\Local\Temp\c187b2ae3566973a18a0725d38d53f6dd5ac59ac1abcf0e11d8054fa348e9739.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/360-59-0x0000000075451000-0x0000000075453000-memory.dmp

    Filesize

    8KB

  • memory/360-60-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB