Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    11-05-2021 16:32

General

  • Target

    475585c68ad5b0bba46c1c0fbb83f9c6c2b0ac790a90c3fdf809ae900158cef0.exe

  • Size

    812KB

  • MD5

    c19e378544f3b9a1909f7ef6f4db5052

  • SHA1

    701b02e37c3dd6366851f4f26dc9414da11abb4a

  • SHA256

    475585c68ad5b0bba46c1c0fbb83f9c6c2b0ac790a90c3fdf809ae900158cef0

  • SHA512

    1aba43940a149970d03e65785253b69ffdc71cd78ac1791f2de76dd36659698a91ab177cfcc4bdadb6698d5a30cb26329a9724c45fa6dc21ab620626921f5a3e

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\475585c68ad5b0bba46c1c0fbb83f9c6c2b0ac790a90c3fdf809ae900158cef0.exe
    "C:\Users\Admin\AppData\Local\Temp\475585c68ad5b0bba46c1c0fbb83f9c6c2b0ac790a90c3fdf809ae900158cef0.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:3176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3176-114-0x0000000001FC0000-0x0000000001FC1000-memory.dmp

    Filesize

    4KB