Analysis

  • max time kernel
    100s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    16-06-2022 09:31

General

  • Target

    2623a1f4d41909ef14e73f14c0cbe72e041dbee6c5774256d99d9b40d0d870bb.exe

  • Size

    711KB

  • MD5

    7133a9bf9f9b3e437d0c99fd6255f56f

  • SHA1

    01a4fcf05af83a8463a7690f1fd9a8c5bcc9f928

  • SHA256

    2623a1f4d41909ef14e73f14c0cbe72e041dbee6c5774256d99d9b40d0d870bb

  • SHA512

    fc03d744af720f29b6d1249209bea4a58c71cae73dd1571dce1f5ddff215b7fa1443af71c87c9b9143b322aff7eee0ae1d066bf4160570728006123f4204666d

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2623a1f4d41909ef14e73f14c0cbe72e041dbee6c5774256d99d9b40d0d870bb.exe
    "C:\Users\Admin\AppData\Local\Temp\2623a1f4d41909ef14e73f14c0cbe72e041dbee6c5774256d99d9b40d0d870bb.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:3784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads