Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    11-05-2021 16:01

General

  • Target

    f154f438427a1d1f4bd1dfdfec0e651834af262bf0eb97c07298d8f0e6987673.exe

  • Size

    711KB

  • MD5

    264f0ad5926583f86ac4fbde7fdf615e

  • SHA1

    b3137f8a53fbd282923eddc5314237bd6b3b5894

  • SHA256

    f154f438427a1d1f4bd1dfdfec0e651834af262bf0eb97c07298d8f0e6987673

  • SHA512

    b637104fc8d271bd780e302a439c5f2c8aaed1d2a1dbff4997f1b6109ec1a3805eb65821a1b79d2e4b3ab856b6781e881d76afe1e7de2a235ced44833733e6f6

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f154f438427a1d1f4bd1dfdfec0e651834af262bf0eb97c07298d8f0e6987673.exe
    "C:\Users\Admin\AppData\Local\Temp\f154f438427a1d1f4bd1dfdfec0e651834af262bf0eb97c07298d8f0e6987673.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1820-59-0x0000000076641000-0x0000000076643000-memory.dmp

    Filesize

    8KB

  • memory/1820-60-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB