Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    02-03-2022 01:57

General

  • Target

    acd0613f2a1ce61f79c566e7e814d936baebe300550550e84bb6c95343c961ff.exe

  • Size

    1.6MB

  • MD5

    2e9d8938b9c0abd3b1ef2fc8f3a9df4f

  • SHA1

    b2529725f4ef2acd0807e21ec25f10d86b3609f1

  • SHA256

    acd0613f2a1ce61f79c566e7e814d936baebe300550550e84bb6c95343c961ff

  • SHA512

    5c160ff60acaef6426b1a9afea4cd0afd9b88cce1a8e5890f9d0e32c32d3dac007ede417fbb34f77d68265f11fb3a4289e4c8fec2a42858584c9f0ae6b64bf55

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acd0613f2a1ce61f79c566e7e814d936baebe300550550e84bb6c95343c961ff.exe
    "C:\Users\Admin\AppData\Local\Temp\acd0613f2a1ce61f79c566e7e814d936baebe300550550e84bb6c95343c961ff.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:3808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3808-130-0x00000000020C0000-0x00000000020C1000-memory.dmp

    Filesize

    4KB