Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    17-05-2021 23:54

General

  • Target

    20a887f00c7a74596fe65affe93f17262f5e2dd7f4bf03ab01a9526a0d26e2c9.exe

  • Size

    812KB

  • MD5

    1a50a963435a10ee3bde9042d723a281

  • SHA1

    7cad44b2928aa9b2b6ffd4a47ab30eb531a27937

  • SHA256

    20a887f00c7a74596fe65affe93f17262f5e2dd7f4bf03ab01a9526a0d26e2c9

  • SHA512

    c441c494170ba58dd2923ba6f46ef645c179bc66171936b6895ac3258634201bfb7f41bee5719ff8f322ca829fc47d20fdef6a2d510e4c3dce34d5d67e7b2ddc

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20a887f00c7a74596fe65affe93f17262f5e2dd7f4bf03ab01a9526a0d26e2c9.exe
    "C:\Users\Admin\AppData\Local\Temp\20a887f00c7a74596fe65affe93f17262f5e2dd7f4bf03ab01a9526a0d26e2c9.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1688-60-0x0000000075011000-0x0000000075013000-memory.dmp

    Filesize

    8KB

  • memory/1688-61-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB