Analysis

  • max time kernel
    119s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    09-03-2022 06:21

General

  • Target

    8f3d0d24a8539c03338f21d66736cdc13f2e4363e62ef5d25b3af2035cf51848.exe

  • Size

    711KB

  • MD5

    00fbc1c77987d7ed356024a310545168

  • SHA1

    7fba5da38fd73b444e3a53dfdd5e212a4868d7e4

  • SHA256

    8f3d0d24a8539c03338f21d66736cdc13f2e4363e62ef5d25b3af2035cf51848

  • SHA512

    a412c586094f131f10a5ec0df2ca7b90bf2adb3e910dcbf60343f84fef214fd0baf53faa23a24a87256e2c8e0d33bc936a1af43e23ffbabcc528a9bd1f68057c

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f3d0d24a8539c03338f21d66736cdc13f2e4363e62ef5d25b3af2035cf51848.exe
    "C:\Users\Admin\AppData\Local\Temp\8f3d0d24a8539c03338f21d66736cdc13f2e4363e62ef5d25b3af2035cf51848.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1648

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1648-55-0x00000000756C1000-0x00000000756C3000-memory.dmp

    Filesize

    8KB

  • memory/1648-56-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB