Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-08-2024 04:56

General

  • Target

    e112fc1eb74db4042044d6c92320c4339aaf2b91b2b51c8830913ff929af6054.exe

  • Size

    711KB

  • MD5

    134c497edbface41beb5c5011bb3a86d

  • SHA1

    bc24c6f0470c14ea4fca9f066def045e31e73741

  • SHA256

    e112fc1eb74db4042044d6c92320c4339aaf2b91b2b51c8830913ff929af6054

  • SHA512

    570737722a77100bca34e8b8ab7595a52a45eeededb0f78f2bf1648784b6abc770c0b96d7123ca4fdbc84537b5fe719154a58d37e207201f8c6161b54ccc3967

  • SSDEEP

    12288:yoxejOONAM7GUC1Jr+4o628gx2Jw+tP3Jzm8JOrHXC3X+pd167QhEQO:hxY3NtGUmJr+4Obxd+tPZSZ7iE6EhE

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • FakeAV payload 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e112fc1eb74db4042044d6c92320c4339aaf2b91b2b51c8830913ff929af6054.exe
    "C:\Users\Admin\AppData\Local\Temp\e112fc1eb74db4042044d6c92320c4339aaf2b91b2b51c8830913ff929af6054.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/636-0-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/636-6-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/636-5-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB