Analysis

  • max time kernel
    3s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    09-05-2021 20:37

General

  • Target

    40185de4b80e4a8d77d875162096ee777f2b48a7084ac3ba04c0d9ed85448c1f.exe

  • Size

    812KB

  • MD5

    ecb850fa40e860bce870f9b26e66c32b

  • SHA1

    4319104cac3100b9c763f914cd53b0ec090d4557

  • SHA256

    40185de4b80e4a8d77d875162096ee777f2b48a7084ac3ba04c0d9ed85448c1f

  • SHA512

    b658d5861f6a733326d063b2c66aa9db162b895cf2fc6ee77e8680f897eebfa6ae71df91ab31e2f6b459e87d4e75155411556bb89bd990e33baddff4316ef503

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40185de4b80e4a8d77d875162096ee777f2b48a7084ac3ba04c0d9ed85448c1f.exe
    "C:\Users\Admin\AppData\Local\Temp\40185de4b80e4a8d77d875162096ee777f2b48a7084ac3ba04c0d9ed85448c1f.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/980-60-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

    Filesize

    8KB

  • memory/980-61-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB