Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    09-05-2021 19:56

General

  • Target

    cfe161ee0c4ee0a24d094d6cba18cf9062d2005b5759f02db8f14049703d6b3f.exe

  • Size

    812KB

  • MD5

    fbb30c93670cdc850f39b1dbf056c48e

  • SHA1

    081599448be0715486e9f7dd2045cad279ae00b0

  • SHA256

    cfe161ee0c4ee0a24d094d6cba18cf9062d2005b5759f02db8f14049703d6b3f

  • SHA512

    ad8b4de493abaf3f6abcd32356dd1253fda343b452ad0f4eb9119886e4ad680fa9e383f1fb8e22ff6e6dc769b1dffcca4199ad551cb20e1483b95efb3b39e42c

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfe161ee0c4ee0a24d094d6cba18cf9062d2005b5759f02db8f14049703d6b3f.exe
    "C:\Users\Admin\AppData\Local\Temp\cfe161ee0c4ee0a24d094d6cba18cf9062d2005b5759f02db8f14049703d6b3f.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1456-114-0x00000000004C0000-0x000000000060A000-memory.dmp

    Filesize

    1.3MB