Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    04-06-2022 09:29

General

  • Target

    11195da79d009365db96759c95531a81a0bfb44ff1464ee8eaea288d546d8913.exe

  • Size

    6.3MB

  • MD5

    8c99974c963ef67fb2e3cc4b7f592f92

  • SHA1

    74e0fb923482d4cc896c8cf666b90a098bcfa332

  • SHA256

    11195da79d009365db96759c95531a81a0bfb44ff1464ee8eaea288d546d8913

  • SHA512

    52303843cc6d43127a0724f692909c63ee9e43c3297beac029c32828a95eaf29e5b41788a7c10f356c45dc73fa8044793c808267451c9e78d3e03cb80324f98b

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11195da79d009365db96759c95531a81a0bfb44ff1464ee8eaea288d546d8913.exe
    "C:\Users\Admin\AppData\Local\Temp\11195da79d009365db96759c95531a81a0bfb44ff1464ee8eaea288d546d8913.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1100

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1100-54-0x0000000075E31000-0x0000000075E33000-memory.dmp

    Filesize

    8KB