Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    09-05-2021 23:00

General

  • Target

    9062ea260ac655897aa4c17909824572c3122e36980afb75d70662072c6adb09.exe

  • Size

    711KB

  • MD5

    c30ebd2d65fdfa66e1ced5943211c2d9

  • SHA1

    3cd4c0f647efd8c61b20f03b1d22017607870185

  • SHA256

    9062ea260ac655897aa4c17909824572c3122e36980afb75d70662072c6adb09

  • SHA512

    eb1ef9a49cfe6f0c2998531fa8163162bfb4bdedc99fa8aee65920a17aa10587ca686dea5aca7a69649dbd6b72942e781d11652c0a02b461711caf557264be56

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9062ea260ac655897aa4c17909824572c3122e36980afb75d70662072c6adb09.exe
    "C:\Users\Admin\AppData\Local\Temp\9062ea260ac655897aa4c17909824572c3122e36980afb75d70662072c6adb09.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1744

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1744-60-0x00000000757E1000-0x00000000757E3000-memory.dmp

    Filesize

    8KB

  • memory/1744-61-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB