Analysis

  • max time kernel
    156s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    31/05/2022, 04:23

General

  • Target

    06d69058adecff07609b0916b28f042629724ee10739b08d4b3631066a613e76.exe

  • Size

    426KB

  • MD5

    58b82f6046af7142174639c87cc98049

  • SHA1

    ccc10bb1450f97141f5da53c06a331ceb9afeb46

  • SHA256

    06d69058adecff07609b0916b28f042629724ee10739b08d4b3631066a613e76

  • SHA512

    20c1242c8ffa359d2d98bac66581e7b346315d377d8e2a64a42f85837a51b36172c0a05e4af81a5844ebdab044d919969046aefb011f2d7e06b3f95bce64c992

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops desktop.ini file(s) 2 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06d69058adecff07609b0916b28f042629724ee10739b08d4b3631066a613e76.exe
    "C:\Users\Admin\AppData\Local\Temp\06d69058adecff07609b0916b28f042629724ee10739b08d4b3631066a613e76.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks computer location settings
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3100
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bVeuivoLvJs" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3870.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:868
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4272
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:1516

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp3870.tmp

      Filesize

      1KB

      MD5

      3f8978356b4643b1324797eea9c2da53

      SHA1

      caf1e13f2e1f79025f394d248dde74933aeadf0d

      SHA256

      26986196bc5badd464f9415cb89f22abc368ad1028454e126fe6148c1fbaa142

      SHA512

      7fed75cec309b0fe4a5850c517bcd388ab6ec390ee5524756a60a03b5bbead301c307fa9283373430ff808d73af14e6f10a9efff3b830c6eefcd79aef2c89f49

    • memory/3100-142-0x0000000074780000-0x0000000074D31000-memory.dmp

      Filesize

      5.7MB

    • memory/3100-131-0x0000000073580000-0x0000000074080000-memory.dmp

      Filesize

      11.0MB

    • memory/3100-132-0x0000000072D70000-0x0000000073518000-memory.dmp

      Filesize

      7.7MB

    • memory/3100-133-0x0000000074780000-0x0000000074D31000-memory.dmp

      Filesize

      5.7MB

    • memory/3100-134-0x0000000073580000-0x0000000074080000-memory.dmp

      Filesize

      11.0MB

    • memory/3100-135-0x0000000072D70000-0x0000000073518000-memory.dmp

      Filesize

      7.7MB

    • memory/3100-130-0x0000000074780000-0x0000000074D31000-memory.dmp

      Filesize

      5.7MB

    • memory/3100-140-0x0000000072D70000-0x0000000073518000-memory.dmp

      Filesize

      7.7MB

    • memory/3100-141-0x0000000073580000-0x0000000074080000-memory.dmp

      Filesize

      11.0MB

    • memory/4272-143-0x0000000074780000-0x0000000074D31000-memory.dmp

      Filesize

      5.7MB

    • memory/4272-144-0x0000000073580000-0x0000000074080000-memory.dmp

      Filesize

      11.0MB

    • memory/4272-145-0x0000000072D10000-0x00000000734B8000-memory.dmp

      Filesize

      7.7MB

    • memory/4272-146-0x0000000074780000-0x0000000074D31000-memory.dmp

      Filesize

      5.7MB

    • memory/4272-147-0x0000000073580000-0x0000000074080000-memory.dmp

      Filesize

      11.0MB

    • memory/4272-148-0x0000000072D10000-0x00000000734B8000-memory.dmp

      Filesize

      7.7MB