Analysis

  • max time kernel
    7s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    11-05-2021 10:25

General

  • Target

    dee3f3bfd43b26d3507297f38a669b111ff136d31fa953c937b5787cb95c2203.exe

  • Size

    1.4MB

  • MD5

    1d827da3dfbdae03758eee1b21157662

  • SHA1

    0f47d06201d6c97971f9fe1d764ce0767af61101

  • SHA256

    dee3f3bfd43b26d3507297f38a669b111ff136d31fa953c937b5787cb95c2203

  • SHA512

    cc385303d543db413c5e95213c7d3d1e00ba933af91d60b4a74646478ee3312a319ec4e569379bdfabf3c9aca5b407b5a99ae431a35b05ce3c2db98e7324ca5a

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dee3f3bfd43b26d3507297f38a669b111ff136d31fa953c937b5787cb95c2203.exe
    "C:\Users\Admin\AppData\Local\Temp\dee3f3bfd43b26d3507297f38a669b111ff136d31fa953c937b5787cb95c2203.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:684

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/684-59-0x0000000075C71000-0x0000000075C73000-memory.dmp

    Filesize

    8KB

  • memory/684-60-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB