Analysis

  • max time kernel
    20s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08/05/2022, 03:56 UTC

General

  • Target

    6ade9e2f3804264e0801056930c8f5844636b850d2704f583e02d8322b00a60d.exe

  • Size

    711KB

  • MD5

    010897a0ac020d40d7e8263e21883fed

  • SHA1

    ee52ab622f348e38660c39d504d858961694b822

  • SHA256

    6ade9e2f3804264e0801056930c8f5844636b850d2704f583e02d8322b00a60d

  • SHA512

    4917a63656c2208619953e8f4bc1cc4231c73cb6df9a5861f11102d6e1044bbbfb7fef7855ffba1c469c6b1d028fc28c753e97b7addc64a0ec816b0259ae87a2

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ade9e2f3804264e0801056930c8f5844636b850d2704f583e02d8322b00a60d.exe
    "C:\Users\Admin\AppData\Local\Temp\6ade9e2f3804264e0801056930c8f5844636b850d2704f583e02d8322b00a60d.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:892

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/892-54-0x0000000074B51000-0x0000000074B53000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.