Analysis

  • max time kernel
    15s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    16-05-2022 11:10

General

  • Target

    f7cca408f174e5d7b970fff33810fe2bdac8c0baf4c9472f398d90ce4e16ead0.exe

  • Size

    1.6MB

  • MD5

    012c009df4e8ea10bbf7954fcd4520cd

  • SHA1

    3cc9bbe9d40f0b0c4be7c295e4f8d6857a81d3e3

  • SHA256

    f7cca408f174e5d7b970fff33810fe2bdac8c0baf4c9472f398d90ce4e16ead0

  • SHA512

    1494899d48fb44ee5c39f615d3449f5bf1d6cefdfb580ad27221151a0edfa7b964d567cb4b5ff8a565dbf6221af2f843dcbf0cf796664e8c81669cca0be30797

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7cca408f174e5d7b970fff33810fe2bdac8c0baf4c9472f398d90ce4e16ead0.exe
    "C:\Users\Admin\AppData\Local\Temp\f7cca408f174e5d7b970fff33810fe2bdac8c0baf4c9472f398d90ce4e16ead0.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1324-54-0x0000000075A61000-0x0000000075A63000-memory.dmp

    Filesize

    8KB