Analysis

  • max time kernel
    136s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    25-02-2022 05:42

General

  • Target

    0dc94bf747908d7ef64c12c63eff9270880f5f41ef36c5bb91b547dd503d5e1c.exe

  • Size

    1.6MB

  • MD5

    9816975bfc605406094a0881be753676

  • SHA1

    2cad03aaaaa7db1321c4e8e24afef1c2b4015cdb

  • SHA256

    0dc94bf747908d7ef64c12c63eff9270880f5f41ef36c5bb91b547dd503d5e1c

  • SHA512

    1b6432488b6b56978fb4be5461b69cdecc2a1c95b9e10bcb555f134989786b41078a4d4df68ab827464327b517f3352d54ec15bdfe316837cf7287f430aac8a9

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dc94bf747908d7ef64c12c63eff9270880f5f41ef36c5bb91b547dd503d5e1c.exe
    "C:\Users\Admin\AppData\Local\Temp\0dc94bf747908d7ef64c12c63eff9270880f5f41ef36c5bb91b547dd503d5e1c.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:4640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4640-130-0x0000000001EE0000-0x0000000001EE1000-memory.dmp

    Filesize

    4KB