Analysis

  • max time kernel
    132s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    11-05-2021 12:58

General

  • Target

    5d0e50df7e238b5fff23b89538f18cf101672f5dbe238b7e74b149ca96f811e7.exe

  • Size

    1.6MB

  • MD5

    ea01d456c5cff0a858fc03e8c09a9a8c

  • SHA1

    2388e1d567bdc06a26de74fe96d07a666ddf1635

  • SHA256

    5d0e50df7e238b5fff23b89538f18cf101672f5dbe238b7e74b149ca96f811e7

  • SHA512

    79207e31064777270793610494351c81a3421d7cbf90d7aa46e15394ff0e9ebd2d273f3dc60fa60baf70e04aec11d31162f0f73285bc4e2a9e73cc48f13123a6

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d0e50df7e238b5fff23b89538f18cf101672f5dbe238b7e74b149ca96f811e7.exe
    "C:\Users\Admin\AppData\Local\Temp\5d0e50df7e238b5fff23b89538f18cf101672f5dbe238b7e74b149ca96f811e7.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1104-60-0x0000000076E11000-0x0000000076E13000-memory.dmp

    Filesize

    8KB

  • memory/1104-61-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB