Analysis

  • max time kernel
    2s
  • max time network
    8s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    09-05-2021 16:30

General

  • Target

    8b897978b0283f1a71e267e693a10fa47307c4f990b7bcbc6bb9256b7eeca106.exe

  • Size

    1.6MB

  • MD5

    f87a0b394b52735664b78d94d4a8a4de

  • SHA1

    a3cecd91554413da92c115f9824e5cd2c653be59

  • SHA256

    8b897978b0283f1a71e267e693a10fa47307c4f990b7bcbc6bb9256b7eeca106

  • SHA512

    32bda7e1d5013b89aaf58ed1cb2318d9e6996487a5fef466ab5ea71dde4013be044f71779adc49eb026883e8aff82213a92ec382604eb4abff2685abb96380b0

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b897978b0283f1a71e267e693a10fa47307c4f990b7bcbc6bb9256b7eeca106.exe
    "C:\Users\Admin\AppData\Local\Temp\8b897978b0283f1a71e267e693a10fa47307c4f990b7bcbc6bb9256b7eeca106.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:452

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/452-60-0x00000000753E1000-0x00000000753E3000-memory.dmp

    Filesize

    8KB

  • memory/452-61-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB