Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    25-02-2022 04:12

General

  • Target

    1c71fdd26676efb7c759b2d37c981a4adcf3ec15d3d8200e875a589da452590e.exe

  • Size

    812KB

  • MD5

    cc1528f956f545b41b3216f84fb5d50c

  • SHA1

    206bdb36dd4c6d689a59d53492c27398e805582b

  • SHA256

    1c71fdd26676efb7c759b2d37c981a4adcf3ec15d3d8200e875a589da452590e

  • SHA512

    31b7bd02cc631acf629f069b9e712e2f1ad7c82e3ced7cdcf6cc5ab108db91d0502627f7075329b2de3dd62f7ccc9fcca5fa0854f24a5645ac0a2791c5824f21

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c71fdd26676efb7c759b2d37c981a4adcf3ec15d3d8200e875a589da452590e.exe
    "C:\Users\Admin\AppData\Local\Temp\1c71fdd26676efb7c759b2d37c981a4adcf3ec15d3d8200e875a589da452590e.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1660-54-0x0000000076141000-0x0000000076143000-memory.dmp

    Filesize

    8KB

  • memory/1660-55-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB