Analysis

  • max time kernel
    2s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    08-05-2021 18:59

General

  • Target

    31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe

  • Size

    812KB

  • MD5

    1b2bf217ac8f4e9f48d28f1a1af994c3

  • SHA1

    37a60a6f28d18cf66b9d615d0d14a8d2004558ab

  • SHA256

    31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6

  • SHA512

    99ab9dd7e8dd04f5baf5e12dd4cca1480d146f153fd73164d6e153a05aa242b13d2ee5617465a615de3af9591a8c827c1b4c591e9d6851ab6841301d1549f11b

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe
    "C:\Users\Admin\AppData\Local\Temp\31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/772-60-0x0000000075EF1000-0x0000000075EF3000-memory.dmp

    Filesize

    8KB

  • memory/772-61-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB