Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    02-03-2022 05:02

General

  • Target

    8d1eb6efeb146b5c250df933db3f156a95bc9af2d6c9fab93c5dbc920289bf2a.exe

  • Size

    1.6MB

  • MD5

    a191ee0f81f64b5592382274bbaadbb6

  • SHA1

    8d310664d52d0d1ccf8ef91458cf61fb4229c4b3

  • SHA256

    8d1eb6efeb146b5c250df933db3f156a95bc9af2d6c9fab93c5dbc920289bf2a

  • SHA512

    9b08dc38bb378e8e2ef0cb9d51101cf7eecf28e017e3fe8b219314c187500f7f5be3ee386b4ddb2c3c14c2d7f94b0ffcb1c5222257b8e1554145b4936f2f6cfb

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d1eb6efeb146b5c250df933db3f156a95bc9af2d6c9fab93c5dbc920289bf2a.exe
    "C:\Users\Admin\AppData\Local\Temp\8d1eb6efeb146b5c250df933db3f156a95bc9af2d6c9fab93c5dbc920289bf2a.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1564-130-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB