Analysis

  • max time kernel
    125s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 04:39

General

  • Target

    3a50669ec62f28c3f9b50f73082a17d1c7d18384d2e74653f027d1c1fb7586c3.exe

  • Size

    711KB

  • MD5

    3dc9720dd73f8fc47ca6c51d4a2ffad8

  • SHA1

    8d926297ad619d01d2e34876d27de55b096000d8

  • SHA256

    3a50669ec62f28c3f9b50f73082a17d1c7d18384d2e74653f027d1c1fb7586c3

  • SHA512

    6bf801f14898d0a4a987e78d13ccf6f29233b54b783882ddbe61ef54de8701757f7d0f79b12d1fe25c727e73582be5b1b00b2bb737882b3e4a008142b7cfe587

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a50669ec62f28c3f9b50f73082a17d1c7d18384d2e74653f027d1c1fb7586c3.exe
    "C:\Users\Admin\AppData\Local\Temp\3a50669ec62f28c3f9b50f73082a17d1c7d18384d2e74653f027d1c1fb7586c3.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:2092

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads