Analysis

  • max time kernel
    107s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    11-05-2021 13:44

General

  • Target

    a981cbb8fb24e2f1b71a17fcd7e8626ee4708fa770e5f71eb68ff1c75348aeab.exe

  • Size

    711KB

  • MD5

    f58cbd9eb7a42f7b0fda1d9d1dc598f1

  • SHA1

    e45ac68b45a90348b550a7be5ac7ab7d7e837398

  • SHA256

    a981cbb8fb24e2f1b71a17fcd7e8626ee4708fa770e5f71eb68ff1c75348aeab

  • SHA512

    05b8ff8e36d93fd02f8b3d4e0059a2d0ea6ccce8e69dbe7545f4cff5866f1dee73593850c755474e2a39e13d407a006b0cfc4cb61e21243f166ce12f2475f931

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a981cbb8fb24e2f1b71a17fcd7e8626ee4708fa770e5f71eb68ff1c75348aeab.exe
    "C:\Users\Admin\AppData\Local\Temp\a981cbb8fb24e2f1b71a17fcd7e8626ee4708fa770e5f71eb68ff1c75348aeab.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1616

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1616-59-0x0000000075631000-0x0000000075633000-memory.dmp

    Filesize

    8KB

  • memory/1616-60-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB