Malware Analysis Report

2024-11-30 10:53

Sample ID 221018-gw3maafack
Target 4c77eaeb83bb5d12e3da032d615e7b3c153d90ccc13369e6976e92f8d4d568f5
SHA256 4c77eaeb83bb5d12e3da032d615e7b3c153d90ccc13369e6976e92f8d4d568f5
Tags
fakeav spyware fakeav
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4c77eaeb83bb5d12e3da032d615e7b3c153d90ccc13369e6976e92f8d4d568f5

Threat Level: Known bad

The file 4c77eaeb83bb5d12e3da032d615e7b3c153d90ccc13369e6976e92f8d4d568f5 was found to be: Known bad.

Malicious Activity Summary

fakeav spyware fakeav

Fakeav family

FakeAV payload

Program crash

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-10-18 06:10

Signatures

FakeAV payload

fakeav spyware
Description Indicator Process Target
N/A N/A N/A N/A

Fakeav family

fakeav

Analysis: behavioral1

Detonation Overview

Submitted

2022-10-18 06:10

Reported

2022-10-18 06:12

Platform

win7-20220812-en

Max time kernel

43s

Max time network

46s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4c77eaeb83bb5d12e3da032d615e7b3c153d90ccc13369e6976e92f8d4d568f5.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\4c77eaeb83bb5d12e3da032d615e7b3c153d90ccc13369e6976e92f8d4d568f5.exe

"C:\Users\Admin\AppData\Local\Temp\4c77eaeb83bb5d12e3da032d615e7b3c153d90ccc13369e6976e92f8d4d568f5.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1184 -s 176

Network

N/A

Files

memory/1184-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

memory/1172-55-0x0000000000000000-mapping.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-10-18 06:10

Reported

2022-10-18 06:12

Platform

win10v2004-20220812-en

Max time kernel

112s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4c77eaeb83bb5d12e3da032d615e7b3c153d90ccc13369e6976e92f8d4d568f5.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\4c77eaeb83bb5d12e3da032d615e7b3c153d90ccc13369e6976e92f8d4d568f5.exe

"C:\Users\Admin\AppData\Local\Temp\4c77eaeb83bb5d12e3da032d615e7b3c153d90ccc13369e6976e92f8d4d568f5.exe"

Network

Country Destination Domain Proto
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
NL 104.80.225.205:443 tcp

Files

N/A