Analysis

  • max time kernel
    85s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    18-05-2021 03:50

General

  • Target

    efc461295d948dc8a0ca95620f9f4a2f2cec4e521b23d66d688cb8ba18ba88bb.exe

  • Size

    711KB

  • MD5

    41ead8ae1510b4bec7afcd3c514ce264

  • SHA1

    efd9b835ac3a9e9fc411266d7ac9f75c91f9c42a

  • SHA256

    efc461295d948dc8a0ca95620f9f4a2f2cec4e521b23d66d688cb8ba18ba88bb

  • SHA512

    00f1a9a4632c655c1b8897feaa3b7444542b550dff9b78d3f253232a79821568223fe391f2342437d00f8d64d9b960553def5fb2248995cc9046c4006a699ee2

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efc461295d948dc8a0ca95620f9f4a2f2cec4e521b23d66d688cb8ba18ba88bb.exe
    "C:\Users\Admin\AppData\Local\Temp\efc461295d948dc8a0ca95620f9f4a2f2cec4e521b23d66d688cb8ba18ba88bb.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1440

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1440-114-0x00000000004C0000-0x000000000056E000-memory.dmp

    Filesize

    696KB