Analysis

  • max time kernel
    117s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    09-03-2022 04:54

General

  • Target

    cb4c08e602daa7148384b9516847119e6512c0788a1c64ee4bd93f23131aa9b9.exe

  • Size

    711KB

  • MD5

    00bcbc40e6a81fb815f9ec9385ef377d

  • SHA1

    bc30e3b70dd40eff87015551e4947ad604af35bf

  • SHA256

    cb4c08e602daa7148384b9516847119e6512c0788a1c64ee4bd93f23131aa9b9

  • SHA512

    3964c5f4aebb00126ee4318bb9ea79cf58b17788b5c2094509d6d794519ab6ef58ec3c604b69b3163a9861e3ef8bc1e66bcc8072e31a837681945b839029e008

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb4c08e602daa7148384b9516847119e6512c0788a1c64ee4bd93f23131aa9b9.exe
    "C:\Users\Admin\AppData\Local\Temp\cb4c08e602daa7148384b9516847119e6512c0788a1c64ee4bd93f23131aa9b9.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/736-55-0x0000000076B81000-0x0000000076B83000-memory.dmp

    Filesize

    8KB

  • memory/736-56-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB