Analysis

  • max time kernel
    13s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    08-05-2021 19:00

General

  • Target

    05774e01c7792fa2917b2dbb037fef44245c12c5af61d576e85b1cf267880ebc.exe

  • Size

    1.6MB

  • MD5

    eda5b645b281a69ac23f9ebecf2233eb

  • SHA1

    8d084bd0973195020b67961c082998deec48ac8e

  • SHA256

    05774e01c7792fa2917b2dbb037fef44245c12c5af61d576e85b1cf267880ebc

  • SHA512

    f82ae395748991874eea985b1a5701427fff64c7cc0205c3bcc9885dcf270d60cb71c3682891e64fea806678784594d4995ce8b537db158bf66f5421975a43a1

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05774e01c7792fa2917b2dbb037fef44245c12c5af61d576e85b1cf267880ebc.exe
    "C:\Users\Admin\AppData\Local\Temp\05774e01c7792fa2917b2dbb037fef44245c12c5af61d576e85b1cf267880ebc.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1020-60-0x0000000075451000-0x0000000075453000-memory.dmp

    Filesize

    8KB

  • memory/1020-61-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB