Analysis

  • max time kernel
    132s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    25-02-2022 06:47

General

  • Target

    03027e10544db135a96449ee288f5f96e8f084e9ac674fd64ca11db77c8a0000.exe

  • Size

    812KB

  • MD5

    ae2625b2b29c3f0fba9ef88dc8d18eeb

  • SHA1

    61613b693f7654f85dd78c9317ef81b046569a54

  • SHA256

    03027e10544db135a96449ee288f5f96e8f084e9ac674fd64ca11db77c8a0000

  • SHA512

    f1e3156fbdc049431b6fd71d6e4b9a1f2a1f4159e1500d22f9b85d5c094314740c6d9c934edd88922981e5eb7fe45b5b49a1953d83c8ef2d8e7d0e1c3e00af48

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03027e10544db135a96449ee288f5f96e8f084e9ac674fd64ca11db77c8a0000.exe
    "C:\Users\Admin\AppData\Local\Temp\03027e10544db135a96449ee288f5f96e8f084e9ac674fd64ca11db77c8a0000.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1124

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1124-130-0x0000000002010000-0x0000000002011000-memory.dmp

    Filesize

    4KB