Analysis

  • max time kernel
    154s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-05-2022 06:38

General

  • Target

    cbd36d0c8cd7ba58cdcec143ed1c672b20198af546f2620b33b3f3df2dbee768.exe

  • Size

    711KB

  • MD5

    00ae21fa79d5f60b4b1f60fd233b5e31

  • SHA1

    0f9e51a463fcc2df08f68e36f8f4c4c10bef82dc

  • SHA256

    cbd36d0c8cd7ba58cdcec143ed1c672b20198af546f2620b33b3f3df2dbee768

  • SHA512

    94b9ea7a68f0da591b68f267c04ca361a6ee3b66d663367b2ee158c6679b60abb49986a7eb3509466aebec578727ccb22f537f0d4b4053f80de2b159e92e706b

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbd36d0c8cd7ba58cdcec143ed1c672b20198af546f2620b33b3f3df2dbee768.exe
    "C:\Users\Admin\AppData\Local\Temp\cbd36d0c8cd7ba58cdcec143ed1c672b20198af546f2620b33b3f3df2dbee768.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads