Analysis

  • max time kernel
    4s
  • max time network
    13s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    11-05-2021 15:20

General

  • Target

    2647cf8b586a61f74e7eba0160541330e8bde138b1c59d709e0b63c4d37cbcd6.exe

  • Size

    1.6MB

  • MD5

    f036e250698183a8892e8e5fa8b63eea

  • SHA1

    62b5b862f7bba08a306527c7e5f591f635f7984f

  • SHA256

    2647cf8b586a61f74e7eba0160541330e8bde138b1c59d709e0b63c4d37cbcd6

  • SHA512

    2bfddbc869b29d7f4911c153053383a34ec9d3d6fa0329ffe17fdf8c32948c50d49e705f9ba6e149aad9e19f708a25e934d9fbc60332eca8679201ecfdc29d93

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2647cf8b586a61f74e7eba0160541330e8bde138b1c59d709e0b63c4d37cbcd6.exe
    "C:\Users\Admin\AppData\Local\Temp\2647cf8b586a61f74e7eba0160541330e8bde138b1c59d709e0b63c4d37cbcd6.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1840-60-0x00000000757C1000-0x00000000757C3000-memory.dmp

    Filesize

    8KB

  • memory/1840-61-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB